If certain local files are manipulated in a certain manner, the validation to use the cryptographic keys can be circumvented.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106600
Source: Mitre, NVD
Published: 2023-08-10
Updated: 2023-08-17
Base Score: 6.2
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:N
Severity: Medium
Base Score: 7.1
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Severity: High