Description
An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.
References
Vendor Advisory
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
US Government Resource
https://www.first.org/cvss/calculator/3.1
Not Applicable
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 · Medium
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-15T13:16:06.250Z
1 month agoLast modified
2026-01-23T15:27:45.867Z
4 weeks ago