An authenticated attacker could create an audit file that bypasses PowerShell cmdlet checks and executes commands with administrator privileges.Referenceshttps://www.tenable.com/security/tns-2022-11