The affected product is vulnerable to an improper access control, which may allow an authenticated user to gain unauthorized access to sensitive data.
Solution:
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsma-22-006-01 | third party advisory us government resource |