Insufficient verification of data authenticity in the...
Low severity
Unreviewed
Published
Feb 13, 2024
to the GitHub Advisory Database
•
Updated Oct 17, 2024
Description
Published by the National Vulnerability Database
Feb 13, 2024
Published to the GitHub Advisory Database
Feb 13, 2024
Last updated
Oct 17, 2024
Insufficient verification of data authenticity in
the configuration state machine may allow a local attacker to potentially load
arbitrary bitstreams.
References