Through the exploitation of active user sessions, an attacker could send custom requests to cause a denial-of-service condition on the device.
Solution:
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-02 | government resource third party advisory us government resource |