Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server.
https://www.velneo.com/blog/disponible-la-nueva-version-velneo-32
https://www.incibe.es/en/incibe-cert/notices/aviso/velneo-vclient-improper-authentication-0
https://velneo.es/mivelneo/listado-de-cambios-velneo-32/
https://doc.velneo.com/v/32/velneo/funcionalidades-comunes/conexion-con-velneo-vserver
https://doc.velneo.com/v/32/velneo-vserver/funcionalidades/protocolo-vatps