The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Etrust_access_control | Broadcom | 4.1 | 4.1 |
Etrust_access_control | Broadcom | 5.0 | 5.0 |
Etrust_access_control | Ca | 4.1 | 4.1 |
Etrust_access_control | Ca | 5.0 | 5.0 |