In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.
Published at: July 24, 2020 at 07:15PM
View on website
from WordPress https://bit.ly/3g2b6Ay
via IFTTT
from Blogger https://bit.ly/2WUdW2M
via IFTTT
from WordPress https://bit.ly/3eWTtR9
via IFTTT
from Blogger https://bit.ly/2D1NtcL
via IFTTT
