LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-06-02T00:00:00
Updated: 2022-06-24T15:00:15
Reserved: 2022-04-28T00:00:00
Link: CVE-2022-1521
JSON object: View
NVD Information
Status : Modified
Published: 2022-06-24T15:15:09.390
Modified: 2023-11-07T03:41:58.820
Link: CVE-2022-1521
JSON object: View
Redhat Information
No data.