An unauthorized user with network access and the decryption key could decrypt sensitive data, such as usernames and passwords.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Proficy_historian | Ge | 7.0 (including) | 2023 (excluding) |