2025-12-17 16:13:38
jci
PUBLISHED
Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive information.