Vulnerabilities
Vulnerable Software
Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.
CVSS Score
7.6
EPSS Score
0.005
Published
2012-12-08


Contact Us

Shodan ® - All rights reserved