CVE-2022-29948
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/06/2022
Last modified:
29/10/2022
Description
Due to an insecure design, the Lepin EP-KP001 flash drive through KP001_V19 is vulnerable to an authentication bypass attack that enables an attacker to gain access to the stored encrypted data. Normally, the encrypted disk partition with this data is unlocked by entering the correct passcode (6 to 14 digits) via the keypad and pressing the Unlock button. This authentication is performed by an unknown microcontroller. By replacing this microcontroller on a target device with one from an attacker-controlled Lepin EP-KP001 whose passcode is known, it is possible to successfully unlock the target device and read the stored data in cleartext.
Impact
Base Score 3.x
4.60
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:lepin_ep-kp001_project:lepinep-kp001_firmware:*:*:*:*:*:*:*:* | kp001_v19 (including) | |
| cpe:2.3:h:lepin_ep-kp001_project:lepin_ep-kp001:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



