The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: BD

Published: 2023-11-28T20:35:59.061Z

Updated: 2024-08-02T14:00:14.915Z

Reserved: 2023-03-30T21:10:17.527Z

Link: CVE-2023-29065

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-28T21:15:07.990

Modified: 2024-11-21T07:56:29.387

Link: CVE-2023-29065

cve-icon Redhat

No data.