The affected product is vulnerable to an attacker modifying the bootloader by using custom arguments to bypass authentication and gain access to the file system and obtain password hashes.
Solution:
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-19 | government resource third party advisory us government resource |