説明
Successful exploitation of this vulnerability could result in the product failing to re-establish communication once the certificate expires.
Successful exploitation of this vulnerability could result in the product failing to re-establish communication once the certificate expires.