CVE-2025-53947
A local attacker with low privileges on the Windows system where the
software is installed can exploit this vulnerability to corrupt
sensitive data. A data folder is created with very weak privileges,
allowing any user logged into the Windows system to modify its content.
More information : https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-06
