2025-12-17 12:36:24
jci
PUBLISHED
Successful exploitation of this vulnerability could result in the product failing to re-establish communication once the certificate expires.