First published: Wed Nov 15 2023(Updated: )
This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.
Credit: ics-cert@hq.dhs.gov
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.