A logged in user can modify specific files that may lead to unauthorized changes in system-wide configuration settings. This vulnerability could be exploited to compromise the integrity and security of the network on the affected system.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Secure_access_client | Ivanti | 22.2-r1 (including) | 22.2-r1 (including) |
Secure_access_client | Ivanti | 22.3-r1 (including) | 22.3-r1 (including) |
Secure_access_client | Ivanti | 22.3-r2 (including) | 22.3-r2 (including) |
Secure_access_client | Ivanti | 22.3-r3 (including) | 22.3-r3 (including) |