An issue was discovered on MECO USB Memory Stick with Fingerprint MECOZiolsamDE601 devices. The fingerprint authentication requirement for data access can be bypassed. An attacker with physical access can send a static packet to a serial port exposed on the PCB to unlock the key and get access to the data without possessing the required fingerprint.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/audebert/ef6e206a27ededd1386cff48604e9335 - Third Party Advisory | |
References | () https://www.blackhat.com/docs/us-17/thursday/us-17-Picod-Attacking-Encrypted-USB-Keys-The-Hard%28ware%29-Way.pdf - | |
References | () https://www.blackhat.com/us-17/briefings/schedule/index.html#attacking-encrypted-usb-keys-the-hardware-way-7443 - Third Party Advisory | |
References | () https://www.elie.net/talk/attacking-encrypted-usb-keys-the-hardware-way - Third Party Advisory |
07 Nov 2023, 02:40
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-03-22 15:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16242
Mitre link : CVE-2017-16242
CVE.ORG link : CVE-2017-16242
JSON object : View
Products Affected
meco
- usb_memory_stick_with_fingerprint_firwmare
- usb_memory_stick_with_fingerprint
CWE
CWE-287
Improper Authentication