An attacker with local access to the machine could record the traffic, which could allow them to resend requests without the server authenticating that the user or session are valid.
Solution:
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13 | broken link |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13 | third party advisory us government resource |