LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2022-06-02T00:00:00

Updated: 2022-06-24T15:00:15

Reserved: 2022-04-28T00:00:00


Link: CVE-2022-1521

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2022-06-24T15:15:09.390

Modified: 2023-11-07T03:41:58.820


Link: CVE-2022-1521

JSON object: View

cve-icon Redhat Information

No data.