2025-12-04 21:10:11
icscert
PUBLISHED
DCIM dcTrack allows an attacker to misuse certain remote access features. An authenticated user with access to the appliances virtual console could exploit these features to redirect network traffic, potentially accessing restricted services or data on the host machine.