A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN.