Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-29948

Опубликовано: 10 июн. 2022
Источник: nvd
CVSS3: 4.6
CVSS2: 2.1
EPSS Низкий

Описание

Due to an insecure design, the Lepin EP-KP001 flash drive through KP001_V19 is vulnerable to an authentication bypass attack that enables an attacker to gain access to the stored encrypted data. Normally, the encrypted disk partition with this data is unlocked by entering the correct passcode (6 to 14 digits) via the keypad and pressing the Unlock button. This authentication is performed by an unknown microcontroller. By replacing this microcontroller on a target device with one from an attacker-controlled Lepin EP-KP001 whose passcode is known, it is possible to successfully unlock the target device and read the stored data in cleartext.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:lepin_ep-kp001_project:lepinep-kp001_firmware:*:*:*:*:*:*:*:*
Версия до kp001_v19 (включая)
cpe:2.3:h:lepin_ep-kp001_project:lepin_ep-kp001:-:*:*:*:*:*:*:*

EPSS

Процентиль: 71%
0.00669
Низкий

4.6 Medium

CVSS3

2.1 Low

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

CVSS3: 4.6
github
больше 3 лет назад

Due to an insecure design, the Lepin EP-KP001 flash drive through KP001_V19 is vulnerable to an authentication bypass attack that enables an attacker to gain access to the stored encrypted data. Normally, the encrypted disk partition with this data is unlocked by entering the correct passcode (6 to 14 digits) via the keypad and pressing the Unlock button. This authentication is performed by an unknown microcontroller. By replacing this microcontroller on a target device with one from an attacker-controlled Lepin EP-KP001 whose passcode is known, it is possible to successfully unlock the target device and read the stored data in cleartext.

EPSS

Процентиль: 71%
0.00669
Низкий

4.6 Medium

CVSS3

2.1 Low

CVSS2

Дефекты

NVD-CWE-Other