Vulnerability Description
Use of encryption key derived from static information in Synaptics Fingerprint Driver allows an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor. This may allow an attacker, who has physical access to the sensor, to enroll a fingerprint into the template database.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Synaptics | Fingerprint Driver | >= 6.0.00.1103, < 6.0.17.1103 |
Related Weaknesses (CWE)
References
- https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryptVendor Advisory
- https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryptVendor Advisory
FAQ
What is CVE-2023-6482?
CVE-2023-6482 is a vulnerability with a CVSS score of 5.2 (MEDIUM). Use of encryption key derived from static information in Synaptics Fingerprint Driver allows an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the finge...
How severe is CVE-2023-6482?
CVE-2023-6482 has been rated MEDIUM with a CVSS base score of 5.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6482?
Check the references section above for vendor advisories and patch information. Affected products include: Synaptics Fingerprint Driver.