CVE-2021-38394
04.10.2021, 18:15
An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.
Vendor | Product | Version |
---|---|---|
bostonscientific | zoom_latitude_pogrammer\/recorder\/monitor_3120_firmware | * |
𝑥
= Vulnerable software versions