Browse all 6 CVE security advisories affecting ARC Informatique. AI-powered Chinese analysis, POCs, and references for each vulnerability.
ARC Informatique develops industrial control system software, primarily for SCADA and HMI applications in critical infrastructure. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from insufficient input validation and access controls. The company has addressed multiple CVEs, with some allowing unauthenticated attackers to execute arbitrary code or bypass security mechanisms. While no major public incidents have been widely reported, the consistent pattern of vulnerabilities in their industrial software highlights ongoing security challenges in protecting operational technology environments from potential compromise.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-4312 | ARC Informatique PcVue 安全漏洞 — PcVueCWE-312 | 5.5 | Medium | 2022-12-12 |
| CVE-2022-4311 | ARC Informatique PcVue 日志信息泄露漏洞 — PcVueCWE-532 | 4.7 | Medium | 2022-12-12 |
| CVE-2022-2569 | ARC Informatique PcVue — PcVue 12 OAuth web service configurationCWE-312 | 5.5 | Medium | 2022-08-24 |
| CVE-2020-26867 | ARC Informatique PcVue Deserialization of Untrusted Data — PcVueCWE-502 | 9.8 | Critical | 2020-10-12 |
| CVE-2020-26869 | ARC Informatique PcVue Exposure of Sensitive Information to an Unauthorized Actor — PcVueCWE-200 | 7.5 | High | 2020-10-12 |
| CVE-2020-26868 | ARC Informatique PcVue Access to Critical Private Variable via Public Method — PcVueCWE-767 | 7.5 | High | 2020-10-12 |
This page lists every published CVE security advisory associated with ARC Informatique. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.