The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.
Solution:
The product uses a hard-coded, unchangeable cryptographic key.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | us government resource third party advisory patch |