Telenot CompasX versions prior to 32.0 use a weak seed...
High severity
Unreviewed
Published
Jan 21, 2022
to the GitHub Advisory Database
•
Updated Sep 16, 2024
Description
Published by the National Vulnerability Database
Jan 20, 2022
Published to the GitHub Advisory Database
Jan 21, 2022
Last updated
Sep 16, 2024
Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for authorization of users.
References