The problem is caused due to errors in the implementation of proxy authentication procedures used in the software of different manufacturers. Researcher Jerry Decime revealed details of the vulnerability allow an attacker to carry out attacks “man in the middle”…
Comments