An argument injection vulnerability exists in the affected product that could allow an attacker to execute arbitrary code within the context of the host machine.
IDIS recommends users to follow these guidelines:
* For users who continue to use the ICM Viewer: * You must access https://icm.idisglobal.com https://icm.idisglobal.com/ and follow the instructions provided to upgrade to version v1.7.1. IDIS requires all users to upgrade to v1.7.1. Failure to do so will render the ICM Viewer unusable.
* For users who do not use the ICM Viewer: * You must immediately uninstall the program from your system.
Configurations
Workarounds
Exploits
Credits
finder
Vera Mens and Noam Moshe of Claroty Team82 reported this vulnerability to CISA.