Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 |
History
Mon, 16 Sep 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | AUVESY Versiondog | AUVESY Versiondog |
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2021-10-22T11:22:44.045095Z
Updated: 2024-09-16T19:30:55.153Z
Reserved: 2021-08-10T00:00:00
Link: CVE-2021-38469
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-10-22T12:15:08.650
Modified: 2024-11-21T06:17:10.800
Link: CVE-2021-38469
Redhat
No data.