The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
2000-10-20T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 10.0 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | broadcom | etrust_access_control | 4.1 | Yes |
Application | broadcom | etrust_access_control | 5.0 | Yes |
Application | ca | etrust_access_control | 4.1 | Yes |
Application | ca | etrust_access_control | 5.0 | Yes |