An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an malicious user to obtain credentials and take over the user’s cloud account.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
azeotech daqfactory 18.1 |
||
azeotech daqfactory |