First published: Fri Mar 31 2023(Updated: )
The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Affected Software | Affected Version | How to fix |
---|---|---|
GENESIS64 AlarmWorX Multimedia |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-23-342 is classified as a high-severity vulnerability due to its potential for remote code execution.
To mitigate ZDI-23-342, users should update ICONICS GENESIS64 to the latest version that addresses this vulnerability.
ZDI-23-342 involves user interaction, requiring the target to visit a malicious page or open a malicious file.
ZDI-23-342 affects installations of ICONICS GENESIS64.
Users can protect against ZDI-23-342 by avoiding suspicious links and files, and ensuring their software is always updated.