An attacker may be able to execute malicious actions due to the lack of device access protections and device permissions when using the web application. This could lead to uploading python files which can be later executed.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-216-01 Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2022-08-04T00:00:00

Updated: 2022-08-09T20:18:31

Reserved: 2022-08-02T00:00:00


Link: CVE-2022-2634

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-08-10T20:15:36.597

Modified: 2022-08-16T11:57:53.887


Link: CVE-2022-2634

JSON object: View

cve-icon Redhat Information

No data.

CWE