Description
The vulnerability, if exploited, could allow an authenticated miscreant (Process Optimization Designer User) to embed OLE objects into graphics, and escalate their privileges to the identity of a victim user who subsequently interacts with the graphical elements.
References
https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
7.4 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-16T02:16:45.833Z
1 month agoLast modified
2026-01-22T15:14:11.433Z
4 weeks ago