An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the user’s cloud account.
The product does not properly protect an assumed-immutable element from being modified by an attacker.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Daqfactory | Azeotech | * | 18.1 (including) | 
| Daqfactory | Azeotech | 18.1-build_2347 (including) | 18.1-build_2347 (including) |