The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02 Patch Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2021-10-05T00:00:00

Updated: 2021-10-22T13:23:38

Reserved: 2021-08-10T00:00:00


Link: CVE-2021-38485

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-10-22T14:15:08.580

Modified: 2021-10-27T15:23:04.207


Link: CVE-2021-38485

JSON object: View

cve-icon Redhat Information

No data.

CWE