Vulnerabilities
Vulnerable Software
Because the web management interface for Unified Intents' Unified Remote solution does not itself require authentication, a remote, unauthenticated attacker can change or disable authentication requirements for the Unified Remote protocol, and leverage this now-unauthenticated access to run code of the attacker's choosing.
CVSS Score
9.8
EPSS Score
0.885
Published
2023-02-06


Contact Us

Shodan ® - All rights reserved