A malicious actor having access to the exported configuration file may obtain the stored credentials and thereby gain access to the protected resource. If the same passwords were used for other resources, further such assets may be compromised.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-03 | Mitigation Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-04-14T00:00:00
Updated: 2022-04-20T15:30:32
Reserved: 2022-03-21T00:00:00
Link: CVE-2022-27179
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-20T16:15:08.660
Modified: 2022-04-28T18:56:14.113
Link: CVE-2022-27179
JSON object: View
Redhat Information
No data.
CWE