An unauthenticated remote attacker can use an uncontrolled resource consumption vulnerability to DoS the affected devices through excessive traffic on a single ethernet port.
Affected Software
Name |
Vendor |
Start Version |
End Version |
F30_03x_yy_(com)_firmware |
Hima |
* |
24.14 (including) |
References