The “ipk” package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in Ovarro TBox, allowing malicious code execution.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-054-04 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-07-28T14:19:30
Updated: 2022-07-28T14:19:30
Reserved: 2021-01-05T00:00:00
Link: CVE-2021-22646
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-07-28T15:15:07.367
Modified: 2022-08-04T14:02:14.427
Link: CVE-2021-22646
JSON object: View
Redhat Information
No data.
CWE