In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.
Published at: July 24, 2020 at 07:15PM
View on website
from WordPress https://bit.ly/32R35dL
via IFTTT
from Blogger https://bit.ly/32TQFSE
via IFTTT
from WordPress https://bit.ly/32SDy47
via IFTTT
from Blogger https://bit.ly/3eYd6s9
via IFTTT
