Описание
In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.
In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.
Связанные уязвимости
In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.
Уязвимость микропрограммного обеспечения продуктов Festo, связанная с недостаточной технической документацией, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации