LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:17:11.157Z

Reserved: 2022-04-28T00:00:00.000Z

Link: CVE-2022-1517

cve-icon Vulnrichment

Updated: 2024-08-03T00:10:02.759Z

cve-icon NVD

Status : Modified

Published: 2022-06-24T15:15:09.220

Modified: 2024-11-21T06:40:53.083

Link: CVE-2022-1517

cve-icon Redhat

No data.