An unauthenticated remote attacker may use the devices traffic capture without authentication to grab plaintext administrative credentials.CreditsFelix Eberstaller and David Schauer from Limes SecurityReferenceshttps://www.schneider-elektronik.de/wp-content/uploads/2024/07/SAR-202405-2.pdf