A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device.
Workaround:
The product uses a cross-domain policy file that includes domains that should not be trusted.
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-04 | third party advisory us government resource |