Medium
The affected product allows a pointer to be read into an object from a file, resulting in type confusion.
The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to modify or crash the program.
Eaton
Versions 7.20 and prior
Refer to vendor advisory for the complete list of affected products and their respective patches.