A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to unauthenticated execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or even the execution of arbitrary code.
References
Link | Resource |
---|---|
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 |
Configurations
No configuration.
History
No history.
Information
Published : 2024-07-02 08:15
Updated : 2024-07-02 12:09
NVD link : CVE-2023-41918
Mitre link : CVE-2023-41918
CVE.ORG link : CVE-2023-41918
JSON object : View
Products Affected
No product.
CWE
CWE-306
Missing Authentication for Critical Function