Due to an insecure design, the Lepin EP-KP001 flash drive through KP001_V19 is vulnerable to an authentication bypass attack that enables an attacker to gain access to the stored encrypted data. Normally, the encrypted disk partition with this data is unlocked by entering the correct passcode (6 to 14 digits) via the keypad and pressing the Unlock button. This authentication is performed by an unknown microcontroller. By replacing this microcontroller on a target device with one from an attacker-controlled Lepin EP-KP001 whose passcode is known, it is possible to successfully unlock the target device and read the stored data in cleartext.
References
Link | Resource |
---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2022/Jun/27 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-06-10 10:15
Updated : 2022-06-20 12:15
NVD link : CVE-2022-29948
Mitre link : CVE-2022-29948
JSON object : View
CWE
Products Affected
lepin_ep-kp001_project
- lepinep-kp001_firmware
- lepin_ep-kp001