First published: Fri Mar 31 2023(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Affected Software | Affected Version | How to fix |
---|---|---|
GENESIS64 AlarmWorX Multimedia |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-343 is critical because it allows remote attackers to execute arbitrary code.
To fix ZDI-23-343, apply the latest security patches provided by ICONICS for GENESIS64.
Affected users are those utilizing ICONICS GENESIS64 installations that have not implemented the necessary security measures.
The attack vector associated with ZDI-23-343 requires user interaction, such as visiting a malicious webpage or opening a malicious file.
No, ZDI-23-343 cannot be exploited without user interaction as it necessitates the target to visit a malicious page or open a malicious file.