CVE-2010-0221
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
07/01/2010
Last modified:
09/04/2025
Description
Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:kingston:datatraveler_blackbox:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:kingston:datatraveler_elite:*:*:privacy:*:*:*:*:* | ||
| cpe:2.3:h:kingston:datatraveler_secure:*:*:privacy:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blogs.zdnet.com/hardware/?p=6655
- http://it.slashdot.org/story/10/01/05/1734242/
- http://news.zdnet.co.uk/security/0%2C1000000189%2C39963327%2C00.htm
- http://securitytracker.com/id?1023410=
- http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html
- http://www.kingston.com/driveupdate/
- http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_Kingston_USB-Stick.pdf
- http://www.syss.de/index.php?id=108&tx_ttnews%5Btt_news%5D=528&cHash=8d16fa63d9
- http://www.vupen.com/english/advisories/2010/0080
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55477
- https://www.ironkey.com/usb-flash-drive-flaw-exposed
- http://blogs.zdnet.com/hardware/?p=6655
- http://it.slashdot.org/story/10/01/05/1734242/
- http://news.zdnet.co.uk/security/0%2C1000000189%2C39963327%2C00.htm
- http://securitytracker.com/id?1023410=
- http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html
- http://www.kingston.com/driveupdate/
- http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_Kingston_USB-Stick.pdf
- http://www.syss.de/index.php?id=108&tx_ttnews%5Btt_news%5D=528&cHash=8d16fa63d9
- http://www.vupen.com/english/advisories/2010/0080
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55477
- https://www.ironkey.com/usb-flash-drive-flaw-exposed



