2025-03-14 12:53:13
SICK AG
PUBLISHED
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.