OpenSC prior to 0.11.7 allows physically proximate malicious users to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
opensc-project opensc 0.9.2 |
||
opensc-project opensc 0.11.4 |
||
opensc-project opensc 0.11.0 |
||
opensc-project opensc 0.9 |
||
opensc-project opensc 0.8.0.0 |
||
opensc-project opensc 0.9.7 |
||
opensc-project opensc |
||
opensc-project opensc 0.11.5 |
||
opensc-project opensc 0.8.0 |
||
opensc-project opensc 0.5.0 |
||
opensc-project opensc 0.10.0 |
||
opensc-project opensc 0.9.8 |
||
opensc-project opensc 0.9.6 |
||
opensc-project opensc 0.7.0 |
||
opensc-project opensc 0.3.5 |
||
opensc-project opensc 0.9.4 |
||
opensc-project opensc 0.9.3 |
||
opensc-project opensc 0.11.2 |
||
opensc-project opensc 0.11.1 |
||
opensc-project opensc 0.8.1 |
||
opensc-project opensc 0.6.1 |
||
opensc-project opensc 0.3.2 |
||
opensc-project opensc 0.10.1 |
||
opensc-project opensc 0.9.5 |
||
opensc-project opensc 0.11.3 |
||
opensc-project opensc 0.8 |
||
opensc-project opensc 0.4.0 |
||
opensc-project opensc 0.6.0 |