Description
An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.
References
Vendor Advisory
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
US Government Resource
https://www.first.org/cvss/calculator/3.1
Not Applicable
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
4.3 · Medium
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-15T13:16:06.527Z
1 month agoLast modified
2026-01-23T15:13:01.380Z
4 weeks ago