2025-06-25 16:32:30
icscert
PUBLISHED
The affected products could allow an unauthenticated attacker to generate forged JSON Web Tokens (JWT) to bypass authentication.