SCO TermVision contains a flaw that may lead to an unauthorized password exposure. TermVision is configured by default to store passwords in a local file using weak encryption. It is possible for a user with access to the local machine to retrieve the file and trivially decrypt it, which may lead to a loss of confidentiality.
Upgrade to version 2.2 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): configure TermVision to prompt for passwords.