First published: Tue Dec 31 2002(Updated: )
Sharp Zaurus PDA SL-5000D and SL-5500 uses a salt of "A0" to encrypt the screen-locking password as stored in the Security.conf file, which makes it easier for local users to guess the password via brute force methods.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sharp Zaurus | =sl-5500 | |
Sharp Zaurus | =sl-5000d | |
All of | ||
Sharp Zaurus SL-5000D Firmware | ||
Sharp Zaurus SL-5000D Firmware | ||
All of | ||
Sharp Zaurus SL-5500 | ||
Sharp Zaurus SL-5500 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1975 is considered to be a moderate risk vulnerability due to its potential for local exploitation.
To mitigate CVE-2002-1975, users should update their Sharp Zaurus devices to the latest firmware version that addresses this vulnerability.
CVE-2002-1975 affects Sharp Zaurus PDA models SL-5000D and SL-5500.
CVE-2002-1975 may allow local attackers to guess the screen-locking password using brute force methods.
There is no widely known public exploit specifically for CVE-2002-1975, but the vulnerability's nature makes it susceptible to local attacks.