Sending some requests in the web application of the vulnerable device allows information to be obtained due to the lack of security in the authentication process.
Solution:
The product stores sensitive information in a file system or device that does not have built-in access control.
The product stores sensitive information without properly limiting read or write access by unauthorized actors.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | third party advisory us government resource |