The affected devices have an exposure of sensitive information vulnerability that could allow an authenticated attacker to extract data via Secure Shell (SSH).
The affected devices have a privilege escalation vulnerability that could allow an attacker to gain root user access.
The affected devices do not properly handle permissions to traverse the file system. If exploited, an attacker could gain access to an overview of the overview of the complete file system on the affected devices.
Refer to ICS Advisory for the patch, upgrade, or suggested workaround information.