mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-08 11:36:33 +00:00
27 lines
1.2 KiB
Markdown
27 lines
1.2 KiB
Markdown
![]() |
### [CVE-2021-34600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34600)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.x41-dsec.de/lab/advisories/x41-2021-003-telenot-complex-insecure-keygen/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/CyberSaiyanIT/RomHack-Conference
|
||
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
||
|
- https://github.com/SYRTI/POC_to_review
|
||
|
- https://github.com/WhooAmii/POC_to_review
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/soosmile/POC
|
||
|
- https://github.com/trhacknon/Pocingit
|
||
|
- https://github.com/x41sec/CVE-2021-34600
|
||
|
- https://github.com/zecool/cve
|
||
|
|