The vulnerability exists due to a at third-party dependency vulnerability that allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires no user interaction.