The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted USB.
|https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01||Third Party Advisory US Government Resource|
Configuration 1 (hide)
Insufficient Verification of Data Authenticity