The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
2023-11-28T21:15:07.990
2024-11-21T07:56:29.387
Modified
CVSSv3.1: 4.1 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | bd | facschorus | 5.0 | Yes |
Application | bd | facschorus | 5.1 | Yes |
Hardware | hp | hp_z2_tower_g9 | - | No |
Application | bd | facschorus | 3.0 | Yes |
Application | bd | facschorus | 3.1 | Yes |
Hardware | hp | hp_z2_tower_g5 | - | No |