First published: Thu Jan 07 2010(Updated: )
SanDisk Cruzer Enterprise USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext drive contents by providing a key that was captured in a USB data stream at an earlier time.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SanDisk Cruzer Enterprise USB |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0226 has a medium severity level due to its potential to allow unauthorized access to sensitive data.
To protect against CVE-2010-0226, avoid using the affected SanDisk Cruzer Enterprise USB flash drives or implement additional encryption.
No, only the SanDisk Cruzer Enterprise USB models are affected by CVE-2010-0226.
CVE-2010-0226 enables password replay attacks, which can lead to unauthorized access to the USB drive's contents.
There is no known patch for CVE-2010-0226, so users should consider alternative security measures.