Description
An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.
Related CPE's
References
https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
6.4 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-10-04T18:15:09.167
3 years agoLast modified
2021-10-13T19:48:19.597
3 years ago