An attacker with physical access to the host can extract...
Moderate severity
Unreviewed
Published
Jan 22, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jan 21, 2022
Published to the GitHub Advisory Database
Jan 22, 2022
Last updated
Jan 27, 2023
An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
References