LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2022-06-24T15:00:12.934513Z

Updated: 2024-09-17T03:43:22.034Z

Reserved: 2022-04-28T00:00:00

Link: CVE-2022-1517

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-24T15:15:09.220

Modified: 2023-11-07T03:41:58.643

Link: CVE-2022-1517

cve-icon Redhat

No data.