René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

136 lines
4.8 KiB
JSON

{
"id": "CVE-2022-29948",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-10T17:15:08.030",
"lastModified": "2022-10-29T02:46:43.147",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Due to an insecure design, the Lepin EP-KP001 flash drive through KP001_V19 is vulnerable to an authentication bypass attack that enables an attacker to gain access to the stored encrypted data. Normally, the encrypted disk partition with this data is unlocked by entering the correct passcode (6 to 14 digits) via the keypad and pressing the Unlock button. This authentication is performed by an unknown microcontroller. By replacing this microcontroller on a target device with one from an attacker-controlled Lepin EP-KP001 whose passcode is known, it is possible to successfully unlock the target device and read the stored data in cleartext."
},
{
"lang": "es",
"value": "Debido a un dise\u00f1o no seguro, la unidad flash Lepin EP-KP001 versiones hasta KP001_V19, es vulnerable a un ataque de omisi\u00f3n de autenticaci\u00f3n que permite a un atacante conseguir acceso a los datos cifrados almacenados. Normalmente, la partici\u00f3n de disco cifrada con estos datos es desbloqueada al introducir el c\u00f3digo de acceso correcto (de 6 a 14 d\u00edgitos) por medio del teclado y pulsando el bot\u00f3n de desbloqueo. Esta autenticaci\u00f3n la lleva a cabo un microcontrolador desconocido. Si es sustituido este microcontrolador en un dispositivo de destino por uno de un Lepin EP-KP001 controlado por un atacante cuyo c\u00f3digo de acceso es conocido, es posible desbloquear con \u00e9xito el dispositivo de destino y leer los datos almacenados en texto sin cifrar"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:lepin_ep-kp001_project:lepinep-kp001_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "kp001_v19",
"matchCriteriaId": "03BE6D3C-58A4-4ACA-87F7-AE0CBA63D773"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:lepin_ep-kp001_project:lepin_ep-kp001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CFAA981-6D0B-4221-8793-950E2AAB7DBA"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2022/Jun/27",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}