Transmitted data is logged between the device and the backend service. An attacker could use these logs to perform a replay attack to replicate calls.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation2 reference(s) from NVD