An unauthenticated remote attacker could exploit the used, insecure TLS 1.0 and TLS 1.1 protocols to intercept and manipulate encrypted communications between the Com-Server and connected systems.

Vulnerable UI

Infosec's favorite weekly newsletter for news, tools, and tips with 23,000+ CISOs, founders, change-makers, and straight up hackers.