12 February 2021 Exploit No Comments Weak identities, vulnerable code and insecure remote connection allowed hackers to take control of the facility. Post Tags :System Social Share :