The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.
Solution:
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | us government resource third party advisory patch |