Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Jul 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Post Oak Bluetooth Traffic Systems Insufficient Entropy | |
Weaknesses | CWE-331 | |
References |
|

Status: PUBLISHED
Assigner: icscert
Published: 2012-12-08T15:00:00Z
Updated: 2025-07-09T18:27:31.737Z
Reserved: 2012-08-28T00:00:00Z
Link: CVE-2012-4687

No data.

Status : Deferred
Published: 2012-12-08T15:55:00.960
Modified: 2025-07-09T19:15:22.840
Link: CVE-2012-4687

No data.