Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21250 | Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation. |
Solution
Update to CompasX versions >= 32.0
Workaround
It is strongly recommended to raise the security level during the time window until the AES keys can be changed to securely generated ones. The complex alarm systems supports alternative authentication factors that can be combined with the Desfire NFC tag authentication. An example for such an additional factor is a requirement for a valid PIN entry on the complex alarm system in addition to a successful Desfire authentication to disarm the alarm.
Mon, 16 Sep 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation. | Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation. |
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T19:04:37.485Z
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-34600
No data.
Status : Modified
Published: 2022-01-20T12:15:08.240
Modified: 2024-11-21T06:10:47.507
Link: CVE-2021-34600
No data.
OpenCVE Enrichment
No data.
EUVD