The setup program for the affected product configures its files and folders with full access, which may allow unauthorized users permission to replace original binaries and achieve privilege escalation.
Solution:
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 | us government resource third party advisory patch |