An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories.
Solution:
Workaround:
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 | us government resource third party advisory mitigation |