An attacker may be able to execute malicious actions due to the lack of device access protections and device permissions when using the web application. This could lead to uploading python files which can be later executed.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-216-01 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-08-04T00:00:00
Updated: 2022-08-09T20:18:31
Reserved: 2022-08-02T00:00:00
Link: CVE-2022-2634
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-10T20:15:36.597
Modified: 2022-08-16T11:57:53.887
Link: CVE-2022-2634
JSON object: View
Redhat Information
No data.
CWE