Description
The Remote Mount feature can potentially be abused by valid, authenticated users to make connections to internal services that may not normally be accessible to users. Internal service access controls, as applicable, remain in effect.
Related CPE's
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
Vulnerable
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2023-01-30T22:15:11.960
2 years agoLast modified
2023-02-08T22:18:21.590
2 years ago