Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-4612 Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
Fixes

Solution

Post Oak has developed a patch for the AWAM Bluetooth Reader Traffic System that mitigates the vulnerability. The patch allows the Bluetooth reader to ensure sufficient entropy exists before generating host and authentication keys. The patch will be installed on all new devices when initially configured. Existing equipment will be patched by remote access and upgraded to the latest firmware. System owners are encouraged to contact Post Oak Traffic Systems, support@postoaktraffic.com, (281) 381-2887. with questions patching their systems.


Workaround

No workaround given by the vendor.

History

Wed, 09 Jul 2025 18:45:00 +0000

Type Values Removed Values Added
Title Post Oak Bluetooth Traffic Systems Insufficient Entropy
Weaknesses CWE-331
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-09T18:27:31.737Z

Reserved: 2012-08-28T00:00:00Z

Link: CVE-2012-4687

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-12-08T15:55:00.960

Modified: 2025-07-09T19:15:22.840

Link: CVE-2012-4687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.