The affected devices transmit sensitive information unencrypted allowing a remote unauthenticated attacker to capture and modify network traffic.
                    
                    
                        The affected devices transmit sensitive information unencrypted allowing a remote unauthenticated attacker to capture and modify network traffic.