The affected product is vulnerable to DLL hijacking, which could allow an attacker to escalate standard user privileges on the host machine.
https://www.cisa.gov/news-events/ics-advisories/icsa-26-125-05
Source: Mitre, NVD
Published: 2026-05-05