Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Jul 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Post Oak Bluetooth Traffic Systems Insufficient Entropy | |
| Weaknesses | CWE-331 | |
| References |
|
Status: PUBLISHED
Assigner: icscert
Published: 2012-12-08T15:00:00Z
Updated: 2025-07-09T18:27:31.737Z
Reserved: 2012-08-28T00:00:00Z
Link: CVE-2012-4687
No data.
Status : Deferred
Published: 2012-12-08T15:55:00.960
Modified: 2025-07-09T19:15:22.840
Link: CVE-2012-4687
No data.