An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the user’s cloud account.
The product does not properly protect an assumed-immutable element from being modified by an attacker.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Daqfactory | Azeotech | * | 18.1 (including) |
Daqfactory | Azeotech | 18.1-build_2347 (including) | 18.1-build_2347 (including) |