The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-16T20:58:26.040Z
Reserved: 2021-08-10T00:00:00
Link: CVE-2021-38485

No data.

Status : Modified
Published: 2021-10-22T14:15:08.580
Modified: 2024-11-21T06:17:13.210
Link: CVE-2021-38485

No data.