Get Demo
A low privileged local attacker can abuse the affected service by using a hardcoded cryptographic key.
The product uses a hard-coded, unchangeable cryptographic key.