Description
The Process Optimization application suite leverages connection channels/protocols that by-default are not encrypted and could become subject to hijacking or data leakage in certain man-in-the-middle or passive inspection scenarios.
References
https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
7.1 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-16T02:16:45.647Z
1 month agoLast modified
2026-01-22T15:11:11.250Z
4 weeks ago