The affected product is vulnerable to misconfigured binaries, allowing users on the target PC with SYSTEM level privileges access to overwrite the binary and modify files to gain privilege escalation.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 | Patch Third Party Advisory US Government Resource |
Configurations
History
17 Oct 2022, 18:12
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 5.7 |
03 May 2022, 18:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.6
v3 : 6.0 |
29 Apr 2022, 19:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fanuc:roboguide:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 6.7 |
References | (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 - Patch, Third Party Advisory, US Government Resource |
20 Apr 2022, 16:45
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-20 16:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-38483
Mitre link : CVE-2021-38483
CVE.ORG link : CVE-2021-38483
JSON object : View
Products Affected
fanuc
- roboguide
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource