Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2012-12-08T15:00:00Z
Updated: 2024-09-16T22:14:36.756Z
Reserved: 2012-08-28T00:00:00Z
Link: CVE-2012-4687
Vulnrichment
No data.
NVD
Status : Modified
Published: 2012-12-08T15:55:00.960
Modified: 2024-11-21T01:43:21.517
Link: CVE-2012-4687
Redhat
No data.