A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device.
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.
Name | Vendor | Start Version | End Version |
---|---|---|---|
L206-f2g_firmware | Westermo | 4.24 (including) | 4.24 (including) |
This Pillar covers several possibilities: