![]() Matthias Deeg and Sebastian Schreiber of SySS reported this vulnerability.Ī local user can bypass access controls to access files on the target flash drive. The local user can then obtain files on the target device.Ĭruzer Enterprise USB flash drive, CZ22 - 1GB, 2GB, 4GB, 8GBĬruzer Enterprise FIPS Edition USB flash drive, CZ32 - 1GB, 2GB, 4GB, 8GBĬruzer Enterprise with McAfee USB flash drive, CZ38 - 1GB, 2GB, 4GB, 8GBĬruzer Enterprise FIPS Edition with McAfee USB flash drive, CZ46 - 1GB, 2GB, 4GB, 8GB ![]() A local user can bypass access controls to access files on the target device.Ī local user can modify a running version of the access control software to cause the password validation process to grant access to the local user. Impact: Disclosure of system information, Disclosure of user informationįix Available: Yes Vendor Confirmed: Yes Exploit Included: YesĪ vulnerability was reported in the SanDisk Cruzer Enterprise USB flash drives. SanDisk Cruzer Enterprise USB Flash Drive Password Validation Flaw Lets Local Users Bypass Access ControlsĬVE Reference: CVE-2010-0224 (Links to External Site) ![]() ![]() Home | View Topics | Search | Contact Us | ![]() SanDisk Cruzer Enterprise USB Flash Drive Password Validation Flaw Lets Local Users Bypass Access Controls - SecurityTracker ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |