Description
If certain local files are manipulated in a certain manner, the validation to use the cryptographic keys can be circumvented.
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.1 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2023-08-10T19:15:09.377
1 year agoLast modified
2023-08-17T14:42:57.963
1 year ago