Vendor
A remote, authenticated attacker can exploit a vulnerability in OpenCTI to gain administrator privileges, potentially leading to unauthorized access and control over the platform.