Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.Referenceshttps://www.tenable.com/security/tns-2023-37https://www.tenable.com/security/tns-2023-38