The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: BD

Published: 2023-11-28T20:35:59.061Z

Updated: 2023-11-28T20:35:59.061Z

Reserved: 2023-03-30T21:10:17.527Z


Link: CVE-2023-29065

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-11-28T21:15:07.990

Modified: 2023-12-05T14:59:07.577


Link: CVE-2023-29065

JSON object: View

cve-icon Redhat Information

No data.