LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.Referenceshttps://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02