An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the user’s cloud account.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-308-02 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2021-11-05T15:39:27
Updated: 2024-08-04T03:38:50.117Z
Reserved: 2021-10-18T00:00:00
Link: CVE-2021-42701
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-11-05T16:15:07.947
Modified: 2024-11-21T06:28:00.137
Link: CVE-2021-42701
Redhat
No data.