The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Etrust_access_control | Broadcom | 4.1 (including) | 4.1 (including) |
Etrust_access_control | Broadcom | 5.0 (including) | 5.0 (including) |
Etrust_access_control | Ca | 4.1-sp1 (including) | 4.1-sp1 (including) |
Etrust_access_control | Ca | 5.0-sp1 (including) | 5.0-sp1 (including) |