Allow attackers to intercept or falsify data exchanges between the client and the serverReferenceshttps://publisher.hitachienergy.com/preview?DocumentId=8DBD000198&languageCode=en&Preview=true