When Command Client initiates a connection to Command Enterprise Software or to a recorder (including the Command Recording Software), it downloads and executes some XAML objects used to render part of the interface, and provide disclaimers and terms of services. These XAML objects may be used as an attack vector, in affected versions of Command Client, to run malicious code in the system where the Command Client is used.
The information has been provided by Joachim Kerschbaumer
The original article can be found at https://www.marchnetworks.com/cve-2019-9163/
A rogue Command Enterprise Software or recorder (including the Command Recording Software) may inject malicious code in the downloaded XAML, or a man in the middle may intercept a valid one, replacing it.
Affected versions of Command Client execute the XAML, leading access to the system where the Command Client is used, exposing its file system and allowing malicious code execution. Said access is limited to the rights of the user that launched Command Client.
March Networks Command Client before 2.7.2