CVE-2025-47698
An adjacent attacker without authentication can exploit this vulnerability to retrieve a set of user-privileged credentials. These credentials are present during the firmware upgrade procedure.
More information : https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-06
