CVE-2016-1919

Samsung KNOX 1.0 uses a weak eCryptFS Key generation algorithm, which makes it easier for local users to obtain sensitive information by leveraging knowledge of the TIMA key and a brute-force attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:samsung:knox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:47

Type Values Removed Values Added
References () http://lists.openwall.net/bugtraq/2016/01/17/2 - Mailing List, Third Party Advisory () http://lists.openwall.net/bugtraq/2016/01/17/2 - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/135303/Samsung-KNOX-1.0-Weak-eCryptFS-Key-Generation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/135303/Samsung-KNOX-1.0-Weak-eCryptFS-Key-Generation.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/537319/100/0/threaded - () http://www.securityfocus.com/archive/1/537319/100/0/threaded -
References () http://www.securityfocus.com/archive/1/537340/100/0/threaded - () http://www.securityfocus.com/archive/1/537340/100/0/threaded -

Information

Published : 2017-01-27 20:59

Updated : 2024-11-21 02:47


NVD link : CVE-2016-1919

Mitre link : CVE-2016-1919

CVE.ORG link : CVE-2016-1919


JSON object : View

Products Affected

samsung

  • knox
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-310

Cryptographic Issues