Описание
The FACSChorus workstation operating system does not restrict what devices can interact with its USB ports. If exploited, a threat actor with physical access to the workstation could gain access to system information and potentially exfiltrate data.
Ссылки
- MitigationVendor Advisory
- MitigationVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:a:bd:facschorus:5.0:*:*:*:*:*:*:*
cpe:2.3:a:bd:facschorus:5.1:*:*:*:*:*:*:*
cpe:2.3:h:hp:hp_z2_tower_g9:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
Одно из
cpe:2.3:a:bd:facschorus:3.0:*:*:*:*:*:*:*
cpe:2.3:a:bd:facschorus:3.1:*:*:*:*:*:*:*
cpe:2.3:h:hp:hp_z2_tower_g5:-:*:*:*:*:*:*:*
EPSS
Процентиль: 16%
0.00052
Низкий
5.4 Medium
CVSS3
5.7 Medium
CVSS3
Дефекты
CWE-1299
CWE-306
Связанные уязвимости
CVSS3: 5.4
github
около 2 лет назад
The FACSChorus workstation operating system does not restrict what devices can interact with its USB ports. If exploited, a threat actor with physical access to the workstation could gain access to system information and potentially exfiltrate data.
EPSS
Процентиль: 16%
0.00052
Низкий
5.4 Medium
CVSS3
5.7 Medium
CVSS3
Дефекты
CWE-1299
CWE-306