Description


An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.

References


https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01

Third Party AdvisoryUS Government Resource

https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01

Third Party AdvisoryUS Government Resource

Weaknesses



CWE-1278

CVSS impact metrics


CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L

6.2 · Medium

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-10-04T16:15:09.167Z

4 years ago

Last modified

2024-11-21T05:16:59.353Z

1 year ago