LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 10.0 |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 |
Information
Published : 2022-06-24 15:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1517
Mitre link : CVE-2022-1517
CVE.ORG link : CVE-2022-1517
JSON object : View
Products Affected
illumina
- iseq_100
- nextseq_550dx
- miseq_dx
- local_run_manager
- nextseq_550
- nextseq_500
- miniseq
- miseq