An access control vulnerability was discovered in the Request Trace and Download Trace functionalities of CMC before 25.1.0 due to a specific access restriction not being properly enforced for users with limited privileges. An authenticated user with limited privileges can request and download trace files due to improper access restrictions, potentially exposing unauthorized network data.
Solution:
Workaround:
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.