The affected product does not properly validate user-supplied data. If a user opens a maliciously formed CSP file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-04