Under certain circumstances a successful exploitation could result in access to the device.CreditsJohnson Controls reported these vulnerabilities to CISA.Referenceshttps://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisorieshttps://www.cisa.gov/news-events/ics-advisories/icsa-25-345-01