The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote malicious users to spoof the eTrust administrator and gain privileges.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ca etrust access control 5.0 |
||
ca etrust access control 4.1 |
||
broadcom etrust access control 4.1 |
||
broadcom etrust access control 5.0 |