The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability.
The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability.