An authenticated attacker could utilize the identical...
Moderate severity
Unreviewed
Published
Nov 1, 2022
to the GitHub Advisory Database
•
Updated Jan 30, 2023
Description
Published by the National Vulnerability Database
Oct 31, 2022
Published to the GitHub Advisory Database
Nov 1, 2022
Last updated
Jan 30, 2023
An authenticated attacker could utilize the identical agent and cluster node linking keys to potentially allow for a scenario where unauthorized disclosure of agent logs and data is present.
References