Описание
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:h:postoaktraffic:awam_bluetooth_reader:-:*:*:*:*:*:*:*
EPSS
Процентиль: 57%
0.00354
Низкий
7.6 High
CVSS2
7.6 High
CVSS2
Дефекты
CWE-331
CWE-310
Связанные уязвимости
github
больше 3 лет назад
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
EPSS
Процентиль: 57%
0.00354
Низкий
7.6 High
CVSS2
7.6 High
CVSS2
Дефекты
CWE-331
CWE-310