CVE-2012-4687
08.12.2012, 15:55
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.Enginsight
Vendor | Product | Version |
---|---|---|
postoaktraffic | awam_bluetooth_reader | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration