• gorysubparbagel@lemmy.world
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    10 months ago

    2 scenarios where it can be exploited:

    Acquiring the ability to compromise a server or perform an adversary-in-the-middle impersonation of it to target a device that’s already configured to boot using HTTP

    Already having physical access to a device or gaining administrative control by exploiting a separate vulnerability.