Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 |
![]() ![]() |
History
Mon, 16 Sep 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | AUVESY Versiondog | AUVESY Versiondog |

Status: PUBLISHED
Assigner: icscert
Published: 2021-10-22T11:22:44.045095Z
Updated: 2024-09-16T19:30:55.153Z
Reserved: 2021-08-10T00:00:00
Link: CVE-2021-38469

No data.

Status : Modified
Published: 2021-10-22T12:15:08.650
Modified: 2024-11-21T06:17:10.800
Link: CVE-2021-38469

No data.