Dallas Semiconductor iButton DS1991 returns predictable values when given an incorrect password, which makes it easier for users with physical access to conduct dictionary attacks against the device password.
References
| Link | Resource |
|---|---|
| http://www.atstake.com/research/advisories/2001/a011801-1.txt | Exploit Vendor Advisory |
| http://www.kb.cert.org/vuls/id/178560 | Exploit Third Party Advisory US Government Resource |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/10625 | |
| http://www.atstake.com/research/advisories/2001/a011801-1.txt | Exploit Vendor Advisory |
| http://www.kb.cert.org/vuls/id/178560 | Exploit Third Party Advisory US Government Resource |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/10625 |
Configurations
History
20 Nov 2024, 23:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.atstake.com/research/advisories/2001/a011801-1.txt - Exploit, Vendor Advisory | |
| References | () http://www.kb.cert.org/vuls/id/178560 - Exploit, Third Party Advisory, US Government Resource | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/10625 - |
Information
Published : 2001-01-18 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-1436
Mitre link : CVE-2001-1436
CVE.ORG link : CVE-2001-1436
JSON object : View
Products Affected
dallas_semiconductor
- ibutton
CWE
