A malicious insider exploiting this vulnerability can...
Moderate severity
Unreviewed
Published
Mar 14, 2024
to the GitHub Advisory Database
•
Updated Mar 14, 2024
Description
Published by the National Vulnerability Database
Mar 14, 2024
Published to the GitHub Advisory Database
Mar 14, 2024
Last updated
Mar 14, 2024
A malicious insider exploiting this vulnerability can circumvent existing security controls put in place by the organization. On the contrary, if the victim is legitimately using the temporary bypass to reach out to the Internet for retrieving application and system updates, a remote device could target it and undo the bypass, thereby denying the victim access to the update service, causing it to fail.
References