This vulnerability allows attackers to bypass ACL constraints and access unauthorized functionality in Liderahenk. Unauthenticated remote attackers can exploit this flaw to gain access to sensitive system resources. No public exploitation has been reported as of publication.
Remediation
Upgrade Liderahenk to version 2.0.2 or later immediately. Restrict public network access to Liderahenk management interfaces until patching is complete. Audit access logs for unauthorized activity after patching.
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.