Secure Elements Information for VU#346377

Secure Elements Class 5 AVR uses the same encryption key and initialization vector for every message session



Vendor Statement

Remediation in C5 EVM version 2.8.1 and above

No change in the 2.8.n release. While it is preferable that the initialization vector be randomly selected for each encrypted session, the selection of a new encryption key to obscure data patterns in successive sessions is a minimal risk. This risk is not applicable in future 3.n.n releases.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.