Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation.
History

Mon, 16 Sep 2024 19:15:00 +0000

Type Values Removed Values Added
Description Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation. Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2022-01-20T11:40:11.195769Z

Updated: 2024-09-16T19:04:37.485Z

Reserved: 2021-06-10T00:00:00

Link: CVE-2021-34600

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-20T12:15:08.240

Modified: 2024-09-16T19:15:58.663

Link: CVE-2021-34600

cve-icon Redhat

No data.