Description
Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.
References
Vendor Advisory
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
US Government Resource
https://www.first.org/cvss/calculator/3.1
Not Applicable
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.1 · Critical
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-15T13:16:05.400Z
1 month agoLast modified
2026-01-23T15:46:56.290Z
4 weeks ago