CVE-2019-12813

An issue was discovered in Digital Persona U.are.U 4500 Fingerprint Reader v24. The key and salt used for obfuscating the fingerprint image exhibit cleartext when the fingerprint scanner device transfers a fingerprint image to the driver. An attacker who sniffs an encrypted fingerprint image can easily decrypt that image using the key and salt.
References
Link Resource
https://github.com/sungjungk/fp-scanner-hacking Exploit Third Party Advisory
https://www.youtube.com/watch?v=Grirez2xeas Exploit Third Party Advisory
https://www.youtube.com/watch?v=wEXJDyEOatM Exploit Third Party Advisory
https://github.com/sungjungk/fp-scanner-hacking Exploit Third Party Advisory
https://www.youtube.com/watch?v=Grirez2xeas Exploit Third Party Advisory
https://www.youtube.com/watch?v=wEXJDyEOatM Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:crossmatch:digital_persona_u.are.u_4500_firmware:24:*:*:*:*:*:*:*
cpe:2.3:h:crossmatch:digital_persona_u.are.u_4500:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:23

Type Values Removed Values Added
References () https://github.com/sungjungk/fp-scanner-hacking - Exploit, Third Party Advisory () https://github.com/sungjungk/fp-scanner-hacking - Exploit, Third Party Advisory
References () https://www.youtube.com/watch?v=Grirez2xeas - Exploit, Third Party Advisory () https://www.youtube.com/watch?v=Grirez2xeas - Exploit, Third Party Advisory
References () https://www.youtube.com/watch?v=wEXJDyEOatM - Exploit, Third Party Advisory () https://www.youtube.com/watch?v=wEXJDyEOatM - Exploit, Third Party Advisory

Information

Published : 2019-06-13 23:29

Updated : 2024-11-21 04:23


NVD link : CVE-2019-12813

Mitre link : CVE-2019-12813

CVE.ORG link : CVE-2019-12813


JSON object : View

Products Affected

crossmatch

  • digital_persona_u.are.u_4500_firmware
  • digital_persona_u.are.u_4500
CWE
CWE-319

Cleartext Transmission of Sensitive Information