First published: Thu Jan 07 2010(Updated: )
SanDisk Cruzer Enterprise USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SanDisk Cruzer Enterprise USB |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0224 is considered a high severity vulnerability due to the ease with which attackers can exploit it.
To mitigate CVE-2010-0224, consider using USB drives that have built-in hardware encryption instead of relying on software for password validation.
Users of SanDisk Cruzer Enterprise USB flash drives are directly affected by CVE-2010-0224.
CVE-2010-0224 allows attackers with physical access to potentially gain unauthorized access to the data stored on the affected USB drives.
CVE-2010-0224 is primarily a software vulnerability, as it involves the password validation process executed on the host computer instead of the hardware.