The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files.Creditsrgod, working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA.Referenceshttps://www.cisa.gov/uscert/ics/advisories/icsa-22-146-01