The affected devices transmit sensitive information unencrypted allowing a remote unauthenticated attacker to capture and modify network traffic.CreditsPh0s[4]R0ckE7Referenceshttps://seclists.org/fulldisclosure/2023/Nov/4