I'm wondering about a scenario where an attacker has physical access, and manages to program their custom application into our device. They could use our stored credentials to authenticate the device, as there doesn't appear to be a mechanism to prevent this.
Is there a way to prevent this? Can the modem firmware validate the application firmware before granting access to the security tags? Is there some mechanism in place that I'm not aware of that prevents this scenario?
Regards,
Josh