The affected product is vulnerable to an attacker being able to use commands without providing a password which may allow an attacker to leak information.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-01 | government resource |