A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN.Referenceshttps://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.htmlhttps://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json