mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
136 lines
4.3 KiB
JSON
136 lines
4.3 KiB
JSON
{
|
|
"id": "CVE-2010-0221",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-01-07T19:30:00.463",
|
|
"lastModified": "2023-11-07T02:05:01.700",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los dispositivos USB Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) validan las contrase\u00f1as con un programa que se ejecuta en el ordenador anfitri\u00f3n y no en el propio dispositivo, lo que permite a atacantes cercanos f\u00edsicamente, acceder a los contenidos del dispositivo mediante un programa modificado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:kingston:datatraveler_blackbox:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBB91653-9096-47B8-9238-3F11F70979F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:kingston:datatraveler_elite:*:*:privacy:*:*:*:*:*",
|
|
"matchCriteriaId": "6EC727F1-07ED-4FA1-B7F9-3F0499ABE62A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:kingston:datatraveler_secure:*:*:privacy:*:*:*:*:*",
|
|
"matchCriteriaId": "6B7C3258-1FD3-490C-85A3-42EA85AB2664"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://blogs.zdnet.com/hardware/?p=6655",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://it.slashdot.org/story/10/01/05/1734242/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://news.zdnet.co.uk/security/0%2C1000000189%2C39963327%2C00.htm",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1023410",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.kingston.com/driveupdate/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_Kingston_USB-Stick.pdf",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.syss.de/index.php?id=108&tx_ttnews%5Btt_news%5D=528&cHash=8d16fa63d9",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2010/0080",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55477",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.ironkey.com/usb-flash-drive-flaw-exposed",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |