First published: Wed Dec 22 2021(Updated: )
ENC DataVault before 7.2 and VaultAPI v67 mishandle key derivation, making it easier for attackers to determine the passwords of all DataVault users (across USB drives sold under multiple brand names).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zendesk Enc Datavault | <7.2 | |
Zendesk Enc Vaultapi | <67.0 | |
Sandisk Secureaccess | =3.02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36750 is a vulnerability in ENC DataVault before 7.2 and VaultAPI v67 that mishandles key derivation, making it easier for attackers to determine the passwords of all DataVault users.
CVE-2021-36750 affects Zendesk Enc DataVault versions up to exclusive 7.2.
CVE-2021-36750 affects Zendesk Enc VaultAPI versions up to exclusive 67.0.
CVE-2021-36750 affects Sandisk Secureaccess version 3.02.
CVE-2021-36750 has a severity level of 8.1 (high).
CVE-2021-36750 is classified as CWE-307 (Improper Restriction of Excessive Authentication Attempts).
To address CVE-2021-36750, please follow the instructions provided in the [ENC Software update article](https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software).
You can find more information about CVE-2021-36750 in the following resources: [RC3 2021 Talk](https://pretalx.c3voc.de/rc3-2021-r3s/talk/QMYGR3/) and [ENC Security Solutions](https://www.encsecurity.com/solutions.php).