An unauthenticated attacker could exploit the vulnerability to modify simulation parameters, training configuration, and training records in AVEVA Pipeline Simulation.
Related CVEs
Source
Read the full article at CISA Advisories.
An unauthenticated attacker could exploit the vulnerability to modify simulation parameters, training configuration, and training records in AVEVA Pipeline Simulation.
Read the full article at CISA Advisories.
Copyright © DevOps Shield. All Rights Reserved. Privacy Policy | Cookie Policy | Terms and Conditions