Technology ❯ Cybersecurity ❯ Vulnerabilities ❯ Software Vulnerabilities
Exploitation hinges on public internet exposure, prompting a temporary removal of external Admin Console access.