There is a possible bypass of carrier restrictions due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.