Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Sep 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation. | Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation. |
MITRE
Status: PUBLISHED
Assigner: CERTVDE
Published: 2022-01-20T11:40:11.195769Z
Updated: 2024-09-16T19:04:37.485Z
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-34600
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-01-20T12:15:08.240
Modified: 2024-11-21T06:10:47.507
Link: CVE-2021-34600
Redhat
No data.