An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
2024-10-15T11:15:11.940
2024-11-21T09:37:35.450
Undergoing Analysis
CVSSv3.1: 8.4 (HIGH)