The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted USB.
The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Zoom_latitude_pogrammer/recorder/monitor_3120_firmware | Bostonscientific | * | * |