2024-09-05 22:41:35
icscert
PUBLISHED
Credentials to access device configuration were transmitted using an unencrypted protocol. These credentials would allow read-only access to network configuration information and terminal configuration data.