Description
Improper input handling in a system endpoint may allow attackers to overload resources, causing a denial of service.
References
Vendor Advisory
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
US Government Resource
https://www.first.org/cvss/calculator/3.1
Not Applicable
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
4.3 · Medium
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-15T13:16:06.660Z
1 month agoLast modified
2026-01-23T14:59:11.110Z
4 weeks ago