An attacker can capture and decrypt the communication between the configuration software and the affected devices, since a symmetric encryption algorithm with a fixed key is used to encrypt the communication.

Filter

Select a date

Search by vendor

Select a date

Search by vendor

Filter