2025-01-14 13:55:57
CERTVDE
PUBLISHED
An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.