SanDisk Cruzer Enterprise USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext drive contents by providing a key that was captured in a USB data stream at an earlier time.
References
Configurations
History
21 Nov 2024, 01:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.sandisk.com/business-solutions/enterprise/technical-support/security-bulletin-december-2009 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/37677 - | |
References | () http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_SanDisk_USB-Stick.pdf - | |
References | () http://www.syss.de/index.php?id=108&tx_ttnews%5Btt_news%5D=528&cHash=8d16fa63d9 - | |
References | () http://www.vupen.com/english/advisories/2010/0078 - | |
References | () https://www.ironkey.com/usb-flash-drive-flaw-exposed - |
Information
Published : 2010-01-07 19:30
Updated : 2024-11-21 01:11
NVD link : CVE-2010-0226
Mitre link : CVE-2010-0226
CVE.ORG link : CVE-2010-0226
JSON object : View
Products Affected
sandisk
- cruzer_enterprise_usb
CWE
CWE-255
Credentials Management Errors