The affected product is vulnerable to misconfigured binaries, allowing users on the target PC with SYSTEM level privileges access to overwrite the binary and modify files to gain privilege escalation.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 | Patch Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 | Patch Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 - Patch, Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 6.0 |
Information
Published : 2022-04-20 16:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38483
Mitre link : CVE-2021-38483
CVE.ORG link : CVE-2021-38483
JSON object : View
Products Affected
fanuc
- roboguide
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource