Successful exploitation of this vulnerability may allow a remote attacker to obtain weakly encrypted user passwords, which could be used to gain unauthorized access to affected products.

https://ics-cert.us-cert.gov/advisories/ICSA-17-117-01