A local user could edit the VideoEdge configuration file and interfere with VideoEdge operation.
Solution:
The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Link | Tags |
---|---|
https://www.johnsoncontrols.com/cyber-solutions/security-advisories | vendor advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-04 | third party advisory us government resource |