A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state.
References
Configurations
No configuration.
History
21 Nov 2024, 08:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 - |
02 Jul 2024, 12:09
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Jul 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-02 08:15
Updated : 2024-11-21 08:21
NVD link : CVE-2023-41921
Mitre link : CVE-2023-41921
CVE.ORG link : CVE-2023-41921
JSON object : View
Products Affected
No product.
CWE
CWE-494
Download of Code Without Integrity Check