A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: NCSC-NL
Published: 2024-07-02T07:42:33.722Z
Updated: 2024-08-02T19:09:49.427Z
Reserved: 2023-09-05T10:14:50.216Z
Link: CVE-2023-41921
Vulnrichment
Updated: 2024-08-02T19:09:49.427Z
NVD
Status : Awaiting Analysis
Published: 2024-07-02T08:15:04.160
Modified: 2024-11-21T08:21:55.600
Link: CVE-2023-41921
Redhat
No data.