2021-10-22 11:23:50
icscert
PUBLISHED
The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.