Описание
Johnson & Johnson Animas OneTouch Ping devices do not properly generate random numbers, which makes it easier for remote attackers to spoof meters by sniffing the network and then engaging in an authentication handshake.
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
- MitigationTechnical DescriptionThird Party Advisory
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
- MitigationTechnical DescriptionThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:animas:onetouch_ping_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:animas:onetouch_ping:-:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.032
Низкий
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
CWE-330
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
Johnson & Johnson Animas OneTouch Ping devices do not properly generate random numbers, which makes it easier for remote attackers to spoof meters by sniffing the network and then engaging in an authentication handshake.
EPSS
Процентиль: 87%
0.032
Низкий
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
CWE-330