A man in the middle can redirect traffic to a malicious server in a compromised configuration.CreditsSkyler Knecht and William Martin from the Adversarial Security Practice at Navy Federal Credit UnionReferenceshttps://support.pega.com/support-doc/pega-security-advisory-b23-robotics-and-workforce-intelligence-local-privilege