A malicious insider exploiting this vulnerability can circumvent existing security controls put in place by the organization. On the contrary, if the victim is legitimately using the temporary bypass to reach out to the Internet for retrieving application and system updates, a remote device could target it and undo the bypass, thereby denying the victim access to the update service, causing it to fail.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: trellix

Published: 2024-03-14T09:11:29.770Z

Updated: 2024-03-14T09:11:29.770Z

Reserved: 2024-01-08T08:01:23.678Z


Link: CVE-2024-0313

JSON object: View

cve-icon NVD Information

Status : Awaiting Analysis

Published: 2024-03-14T09:15:47.153

Modified: 2024-03-14T12:52:09.877


Link: CVE-2024-0313

JSON object: View

cve-icon Redhat Information

No data.

CWE