Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Improper Access Control for Register Interface

The product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there is improper access control to those registers.