LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 | 
                     | 
            
History
                    Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: icscert
Published: 2022-06-24T15:00:15.565Z
Updated: 2025-04-16T16:16:46.654Z
Reserved: 2022-04-28T00:00:00.000Z
Link: CVE-2022-1521
Updated: 2024-08-03T00:10:03.014Z
Status : Modified
Published: 2022-06-24T15:15:09.390
Modified: 2024-11-21T06:40:53.613
Link: CVE-2022-1521
No data.