Secure Elements Information for VU#346377
Secure Elements Class 5 AVR uses the same encryption key and initialization vector for every message session
Remediation in C5 EVM version 2.8.1 and above
No change in the 2.8.n release. While it is preferable that the initialization vector be randomly selected for each encrypted session, the selection of a new encryption key to obscure data patterns in successive sessions is a minimal risk. This risk is not applicable in future 3.n.n releases.
The vendor has not provided us with any further information regarding this vulnerability.
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.