2024-06-13 17:22:10
icscert
PUBLISHED
Transmitted data is logged between the device and the backend service. An attacker could use these logs to perform a replay attack to replicate calls.