The affected product is vulnerable to a unsanitized extract folder for system configuration. A low-privileged user can leverage this logic to overwrite the settings and other key functionality.
Solution:
Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02 | us government resource third party advisory patch |