Description
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files.
References
https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
8.1 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-16T02:16:45.467Z
1 month agoLast modified
2026-01-22T15:15:10.460Z
4 weeks ago