An unauthenticated remote attacker could exploit the used, insecure TLS 1.0 and TLS 1.1 protocols to intercept and manipulate encrypted communications between the Com-Server and connected systems.

Immunefi

On Immunefi, hackers secure web3, save funds from theft, and get paid the world's largest bug bounties.