Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 |     | 
History
                    Mon, 16 Sep 2024 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Title | AUVESY Versiondog | AUVESY Versiondog | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: icscert
Published: 2021-10-22T11:22:44.045095Z
Updated: 2024-09-16T19:30:55.153Z
Reserved: 2021-08-10T00:00:00
Link: CVE-2021-38469
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Modified
Published: 2021-10-22T12:15:08.650
Modified: 2024-11-21T06:17:10.800
Link: CVE-2021-38469
 Redhat
                        Redhat
                    No data.