Description
The affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with “user” privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens.
Problem types
CWE-285 Improper Authorization
Product status
Any version
Any version
Any version
Any version
Any version
Credits
Floris Hendriks
Jeroen Wijenbergh
Radboud University
References
www.cisa.gov/news-events/ics-advisories/icsa-23-180-03
www.cisa.gov/news-events/ics-advisories/icsa-23-180-03