The affected product is vulnerable to a missing permission validation on system backup restore, which could lead to account take over and unapproved settings change.
Solution:
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02 | patch third party advisory us government resource |