O scapare ar putea permite atacatorilor decriptarea flash driverelor criptate
2Mai multi producatori de flash drivere au lansat recent avertismente in privinta unor scapari ce ar putea permite atacatorilor accesarea informatiilor criptate de pe niste USB drivere ce sunt considerate sigure.
Respectivele flashuri folosesc algoritmul de criptare AES, cu o cheie de 256 biti pentru a proteja informatiile sensibile. Vulnerabilitatea ce afecteaza flashurile KingSton, SanDisk si Verbatim este prezenta in mecanismul ce verifica parolele individuale.
“A skilled person with the proper tools and physical access to the drives may be able to gain unauthorized access to data contained on [certain] Kingston Secure USB drives,†a spus Kingston pe website-ul lor.
Problema de securitate nu este prezenta in partea hardware/firmware a gadgetului, ci este o eroare descoperita in partea software a flashurilor.
Flashurile afectate
* SanDisk Cruzer Enterprise USB flash drive, CZ22 (1GB, 2GB, 4GB, 8GB)
* SanDisk Cruzer Enterprise FIPS Edition USB flash drive, CZ32 (1GB, 2GB, 4GB, 8GB)
* SanDisk Cruzer Enterprise with McAfee USB flash drive, CZ38 (1GB, 2GB, 4GB, 8GB)
* SanDisk Cruzer Enterprise FIPS Edition with McAfee USB flash drive, CZ46 (1GB, 2GB, 4GB, 8GB)
* Kingston DataTraveler BlackBox (DTBB)
* Kingson DataTraveler Secure – Privacy Edition (DTSP)
* Kingson DataTraveler Elite – Privacy Edition (DTEP)
* Verbatim Corporate Secure USB Flash Drive (1GB, 2GB, 4GB, 8GB)
* Verbatim Corporate Secure FIPS Edition USB Flash Drives (1GB, 2GB, 4GB, 8GB)
“Frankly, it’s pretty shameful that these so-called secure drives should be vulnerable to this kind of attack.Clearly, if someone inside your organization, or an attacker…was interested in reading confidential information held on an encrypted USB stick, then this would be a very attractive method of attack (if they could gain physical access to the device).” spune Graham Cluley.
Raman din ce in ce mai des surprins de greselile ce le fac aceste companii care ne garanteaza securitatea informatiilor noastre. 🙂
[…] This post was mentioned on Twitter by Avadanei Andrei and Avadanei Andrei, Andrei Avadanei. Andrei Avadanei said: O scapare ar putea permite atacatorilor decriptarea flash driverelor criptate http://bit.ly/50zUud #WorldIT ! […]
uhm…ok, dar ce fel de vulnerabilitate ? ca nu scrie nimic decat „so-called secure drives should be vulnerable to this kind of attack.” what kind man?
google is my friend..
SySS discovered that, regardless of the password being used, the Windows access control program ultimately sent the same sequence of bytes to the drive to „unlock” it. Thus, SySS were able to write a program that sent the „unlock” code regardless of the password entered, and gain immediate access to the flash drive’s entire contents.