LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 |
![]() ![]() |
History
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:16:46.654Z
Reserved: 2022-04-28T00:00:00.000Z
Link: CVE-2022-1521

Updated: 2024-08-03T00:10:03.014Z

Status : Modified
Published: 2022-06-24T15:15:09.390
Modified: 2024-11-21T06:40:53.613
Link: CVE-2022-1521

No data.