A malicious actor having access to the exported configuration file may obtain the stored credentials and thereby gain access to the protected resource. If the same passwords were used for other resources, further such assets may be compromised.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-03 Mitigation Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2022-04-14T00:00:00

Updated: 2022-04-20T15:30:32

Reserved: 2022-03-21T00:00:00


Link: CVE-2022-27179

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-04-20T16:15:08.660

Modified: 2022-04-28T18:56:14.113


Link: CVE-2022-27179

JSON object: View

cve-icon Redhat Information

No data.

CWE