Description
An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.
References
Vendor Advisory
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
US Government Resource
https://www.first.org/cvss/calculator/3.1
Not Applicable
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.9 · Critical
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-15T13:16:05.263Z
1 month agoLast modified
2026-01-23T15:49:41.073Z
4 weeks ago