Description
An unauthorized user could possibly delete any file on the system.
References
https://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01
Permissions RequiredVendor Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01
Third Party AdvisoryUS Government Resource
https://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01
Permissions RequiredVendor Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 · High
Information
Source identifier
Vulnerability status
Modified
Published
2023-01-17T23:15:12.183Z
3 years agoLast modified
2024-11-21T06:30:24.230Z
1 year ago