Does your company have a process in place to watch for and apply regular patches from vendors of non traditional systems like these ?
“... Vulnerability could be exploited by an attacker to bypass the authentication mechanism ... Vulnerability could be exploited by an authenticated attacker with a low-privileged account to escalate privileges and perform administrative operations ... Vulnerability could be exploited by an attacker to cause a DoS ...”
No comments:
Post a Comment