An attacker may be able to execute malicious actions due to the lack of device access protections and device permissions when using the web application. This could lead to uploading python files which can be later executed.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-216-01 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2022-08-09T20:18:31.257922Z
Updated: 2024-09-16T20:43:04.145Z
Reserved: 2022-08-02T00:00:00
Link: CVE-2022-2634
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-08-10T20:15:36.597
Modified: 2024-11-21T07:01:24.657
Link: CVE-2022-2634
Redhat
No data.