LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 | 
                     | 
            
History
                    Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: icscert
Published: 2022-06-24T15:00:12.934Z
Updated: 2025-04-16T16:17:11.157Z
Reserved: 2022-04-28T00:00:00.000Z
Link: CVE-2022-1517
Updated: 2024-08-03T00:10:02.759Z
Status : Modified
Published: 2022-06-24T15:15:09.220
Modified: 2024-11-21T06:40:53.083
Link: CVE-2022-1517
No data.