DCIM dcTrack allows an attacker to misuse certain remote access features. An authenticated user with access to the appliances virtual console could exploit these features to redirect network traffic, potentially accessing restricted services or data on the host machine.
The product requires authentication, but the product has an alternate path or channel that does not require authentication.