An unauthenticated remote attacker could exploit the used, insecure TLS 1.0 and TLS 1.1 protocols to intercept and manipulate encrypted communications between the Com-Server and connected systems.
2025-04-28T10:15:16.033
2025-04-29T13:52:10.697
Awaiting Analysis
CVSSv3.1: 9.1 (CRITICAL)
-