eyeDisk implements the unlock feature by sending a cleartext password. The password can be discovered by sniffing USB traffic or by sending a 06 05 52 41 01 b0 00 00 00 00 00 00 SCSI command.
References
Link | Resource |
---|---|
https://www.pentestpartners.com/security-blog/eyedisk-hacking-the-unhackable-again/ | Exploit Third Party Advisory |
https://www.pentestpartners.com/security-blog/eyedisk-hacking-the-unhackable-again/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.pentestpartners.com/security-blog/eyedisk-hacking-the-unhackable-again/ - Exploit, Third Party Advisory |
Information
Published : 2019-05-12 14:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11885
Mitre link : CVE-2019-11885
CVE.ORG link : CVE-2019-11885
JSON object : View
Products Affected
eye-disk
- eyedisk
CWE
CWE-522
Insufficiently Protected Credentials