Agiloft Release 28 downloads critical system packages over an insecure HTTP connection. An attacker in a Man-In-the-Middle position could replace or modify the contents of the download URL. Users should upgrade to Agiloft Release 30.
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.