These Sinapsi devices do not check the validity of the data before executing queries. By accessing the SQL table of certain pages that do not require authentication within the device, attackers can leak information from the device. This could allow the attacker to compromise confidentiality.
https://www.cisa.gov/news-events/ics-advisories/icsa-12-325-01
https://exchange.xforce.ibmcloud.com/vulnerabilities/80201
https://exchange.xforce.ibmcloud.com/vulnerabilities/80200
http://www.us-cert.gov/control_systems/pdf/ICSA-12-325-01.pdf
http://www.sinapsitech.it/default.asp?active_page_id=78&news_id=88