Successful exploitation of this vulnerability could allow an unauthorized user to access sensitive data.
Solution:
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://www.johnsoncontrols.com/cyber-solutions/security-advisories | vendor advisory |
https://us-cert.gov/ics/advisories/ICSA-21-336-02 | mitigation third party advisory us government resource |