Description
A local attacker with low privileges on the Windows system where the software is installed can exploit this vulnerability to corrupt sensitive data. A data folder is created with very weak privileges, allowing any user logged into the Windows system to modify its content.
Problem types
Product status
5.x (custom)
5.x (custom)
5.x (custom)
5.x (custom)
5.x (custom)
Credits
Diego Giubertoni of Nozomi Networks reported these vulnerabilities to CISA.
References
www.cisa.gov/news-events/ics-advisories/icsa-25-261-06