Authentication bypass vulnerability in the device authentication module. Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
Exploitability
AV:AAC:LPR:NUI:NScope
S:CImpact
C:HI:HA:H9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HOther