High
CVSS 7.6
Overview
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source o...
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
This vulnerability is rated 🟠 HIGH.
Recommended actions: