There are multiple ways an unauthenticated attacker could perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information.Referenceshttps://www.us-cert.gov/ics/advisories/icsa-20-098-01