CVE-2026-1495
The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.
Vendor
-
Product
-
CWE
Yayın Tarihi
2026-02-10 21:16:01
Güncelleme
2026-02-10 21:51:48
Source Identifier
ics-cert@hq.dhs.gov
KEV Date Added
-