2021-10-22 11:23:18
icscert
PUBLISHED
The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.