The database connection to the server is performed by calling a specific API, which could allow an unprivileged user to gain SYSDBA permissions.
Solution:
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | us government resource third party advisory patch |