Количество 27
Количество 27

CVE-2023-40660
A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVE-2023-40660
CVE-2023-40660
A flaw was found in OpenSC packages that allow a potential PIN bypass. ...
GHSA-phh2-j3h6-vqr9
An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

BDU:2024-02587
Уязвимость драйвера MyEID набора программных инструментов и библиотек для работы со смарт-картами OpenSC, позволяющая нарушителю потенциально получить несанкционированный доступ к конфиденциальным данным
GHSA-7635-x5f9-5458
A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

BDU:2024-02589
Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильной аутентификацией, позволяющая нарушителю получить несанкционированный доступ, выполнить произвольные действия или скомпрометировать систему
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-40660 A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness. | CVSS3: 6.6 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 6.6 | 0% Низкий | 12 месяцев назад | |
CVE-2023-40660 A flaw was found in OpenSC packages that allow a potential PIN bypass. ... | CVSS3: 6.6 | 0% Низкий | больше 1 года назад | |
GHSA-phh2-j3h6-vqr9 An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security. | CVSS3: 4.5 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-02587 Уязвимость драйвера MyEID набора программных инструментов и библиотек для работы со смарт-картами OpenSC, позволяющая нарушителю потенциально получить несанкционированный доступ к конфиденциальным данным | CVSS3: 3.8 | 0% Низкий | больше 1 года назад |
GHSA-7635-x5f9-5458 A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness. | CVSS3: 6.6 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-02589 Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильной аутентификацией, позволяющая нарушителю получить несанкционированный доступ, выполнить произвольные действия или скомпрометировать систему | CVSS3: 6.6 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу