The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json
https://www.first.org/cvss/calculator/3.1
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices