Unauthorized users can access the system without proper authorization, which could lead to unauthorized access to system resources.
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-100-01
Source: Mitre, NVD
Published: 2025-04-11