An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.
Workaround:
Information stored in hardware may be recovered by an attacker with the capability to capture and analyze images of the integrated circuit using techniques such as scanning electron microscopy.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01 | third party advisory us government resource |