Under certain circumstances the Linux users credentials may be recovered by an authenticated user.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-05
https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories
Source: Mitre, NVD
Published: 2024-07-02
Updated: 2024-07-02
Base Score: 4
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N
Severity: Medium
Base Score: 6.8
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N