LRM utilizes elevated privileges. An unauthenticated...
Critical severity
Unreviewed
Published
Jun 25, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jun 24, 2022
Published to the GitHub Advisory Database
Jun 25, 2022
Last updated
Jan 27, 2023
LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.
References