An attacker may be able to execute malicious actions due to the lack of device access protections and device permissions when using the web application. This could lead to uploading python files which can be later executed.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-216-01 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2022-08-09T20:18:31.257922Z
Updated: 2024-09-16T20:43:04.145Z
Reserved: 2022-08-02T00:00:00
Link: CVE-2022-2634
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2022-08-10T20:15:36.597
Modified: 2022-08-16T11:57:53.887
Link: CVE-2022-2634
Redhat
No data.