This vulnerability allows unauthenticated remote attackers to bypass authentication and gain APIs access of the Manager.CreditsKentaro KawaneReferenceshttps://thrive.trellix.com/s/article/000013870