First published: Fri Jan 27 2017(Updated: )
Samsung KNOX 1.0 uses a weak eCryptFS Key generation algorithm, which makes it easier for local users to obtain sensitive information by leveraging knowledge of the TIMA key and a brute-force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung KNOX | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1919 is rated as a high severity vulnerability due to its potential for sensitive information exposure.
To mitigate CVE-2016-1919, users should update their Samsung KNOX software to a version beyond 1.0 that resolves the key generation weaknesses.
CVE-2016-1919 affects users of Samsung KNOX version 1.0 and earlier installations of the application.
CVE-2016-1919 allows local users to perform brute-force attacks to gain access to sensitive information.
CVE-2016-1919 exploits a weak eCryptFS key generation algorithm used in Samsung KNOX.