Description


Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.

Weaknesses



CWE-284


CWE-863

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 · High

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2026-01-15T13:16:05.537Z

1 month ago

Last modified

2026-01-23T15:46:11.580Z

4 weeks ago