An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
bostonscientific zoom_latitude_pogrammer\\/recorder\\/monitor_3120_firmware |