An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.Referenceshttps://sick.com/psirthttps://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdfhttps://www.cisa.gov/resources-tools/resources/ics-recommended-practiceshttps://www.first.org/cvss/calculator/3.1https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0001.jsonhttps://www.sick.com/.well-known/csaf/white/2026/sca-2026-0001.pdf