5.2
CVE-2023-6482
- EPSS 0.07%
- Published 27.01.2024 01:15:08
- Last modified 21.11.2024 08:43:56
- Source PSIRT@synaptics.com
- Teams watchlist Login
- Open Login
Use of encryption key derived from static information in Synaptics Fingerprint Driver allows an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor. This may allow an attacker, who has physical access to the sensor, to enroll a fingerprint into the template database.
Data is provided by the National Vulnerability Database (NVD)
Synaptics ≫ Fingerprint Driver Version >= 6.0.00.1103 < 6.0.17.1103
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.225 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.2 | 0.9 | 4.2 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
|
PSIRT@synaptics.com | 5.2 | 0.9 | 4.2 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
|
CWE-321 Use of Hard-coded Cryptographic Key
The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.