NA

CVE-2024-22005

Published: 11/03/2024 Updated: 15/03/2024

Vulnerability Summary

there is a possible Authentication Bypass due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.