Post Oak AWAM Bluetooth Reader Traffic System does not...
High severity
Unreviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Jul 9, 2025
Description
Published by the National Vulnerability Database
Dec 8, 2012
Published to the GitHub Advisory Database
May 17, 2022
Last updated
Jul 9, 2025
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
References