Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-29948

Due to an insecure design, the Lepin EP-KP001 flash drive through KP001_V19 is vulnerable to an authentication bypass attack that enables an attacker to gain access to the stored encrypted data. Normally, the encrypted disk partition with this data is unlocked by entering the correct passcode (6 to 14 digits) via the keypad and pressing the Unlock button. This authentication is performed by an unknown microcontroller. By replacing this microcontroller on a target device with one from an attacker-controlled Lepin EP-KP001 whose passcode is known, it is possible to successfully unlock the target device and read the stored data in cleartext.

CVE
#vulnerability#web#amazon#js#git#java#auth

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2022-024 Product: EP-KP001 Manufacturer: Lepin Affected Version(s): KP001_V19 Tested Version(s): KP001_V19 Vulnerability Type: Violation of Secure Design Principles (CWE-657) Risk Level: High Solution Status: Open Manufacturer Notification: 2022-04-12 Solution Date: - Public Disclosure: 2022-06-10 CVE Reference: CVE-2022-29948 Author of Advisory: Matthias Deeg (SySS GmbH) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: The Lepin EP-KP001 is a USB flash drive with AES-256 hardware encryption and a built-in keypad for passcode entry. The manufacturer describes the product as follows (see [1]): "[Safeguard Your Sensitive DATA] With Military Grade Full-disk 256-bit AES XTS Hardware Encryption to protect your important files. All your data is protected by hardware encryption, so no one can access your data without knowing the password." Due to an insecure design, the Lepin EP-KP001 flash drive is vulnerable to an authentication bypass attack which enables an attacker to gain unauthorized access to the stored encrypted data. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Vulnerability Details: When analyzing the USB flash drive Lepin EP-KP001, Matthias Deeg found out that it uses an insecure hardware design which allows an attacker to bypass the password-based user authentication. The Lepin EP-KP001 consists of the following four main parts: 1. An unknown NAND flash memory chip 2. An Alcor Micro flash disk controller (AU6989SNBL-GTD) 3. An unknown microcontroller (unkmarked chip) used as keypad controller 4. A high-speed analog switch (SGM7222) The encrypted disk partition with the stored user data can be unlocked by entering the correct passcode via the keypad and pressing the “unlock” button. Due to the performed analysis, the password-based user authentication via a passcode comprised of 6 to 14 digits is performed by the unknown microcontroller. By replacing this unknown microcontroller on a target device with one from an attacker-controlled Lepin EP-KP001 whose passcode was known, it was possible to successfully unlock the targeted Lepin EP-KP001 USB flash drive and to gain unauthorized access to the stored data in cleartext. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept (PoC): A successful authentication bypass attack could be performed via the following steps: 1. Set a passcode on an attacker-controlled Lepin EP-KP001. 2. Desolder the unmarked microcontroller from the attacker-controlled device. 3. Desolder the unmarked microcontroller from the targeted Lepin EP-KP001. 4. Solder the unmarked microcontroller from the attacker-controlled device on the targeted device. 5. Unlock the targeted device with the initially set and known passcode. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: SySS is not aware of a security fix for the described security issue. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclosure Timeline: 2022-04-12: Vulnerability reported to manufacturer 2022-06-10: Public release of security advisory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ References: [1] Product website for Lepin EP-KP001 https://www.amazon.com/Encrypted-Password-Aluminum-Portable-Protected/dp/B06W5H9GP7/ [2] SySS Security Advisory SYSS-2022-024 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt [4] SySS GmbH, SySS Responsible Disclosure Policy https://www.syss.de/en/responsible-disclosure-policy ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Credits: This security vulnerability was found by Matthias Deeg of SySS GmbH. E-Mail: matthias.deeg (at) syss.de Public Key: https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclaimer: The information provided in this security advisory is provided “as is” and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on the SySS website. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Copyright: Creative Commons - Attribution (by) - Version 3.0 URL: http://creativecommons.org/licenses/by/3.0/deed.en -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE0fCgNfBs5nXNuQUU2aS/ajStTasFAmKZ+moACgkQ2aS/ajSt TatFsg/8C65QFqCgpTK1lgLr8Z9/iVpNRXijWIVGzz6+RW/f0rcXlLFVG/nQjVA8 F/qW09wePaQdGA/fjzFQvIXzu2/qCjnqlzEVP/2o7JnKGGby1f2xyIBwctyztRgX n3PJ9dYLFu7WryD+vjOEgesl93owKD6PyDfheh0+mtxK8CF+B0kqVqP88xpfAFd+ mt3NIqoRyrlePISpEd/xcCesMlVOZyYiASHpWNCecDuXjrE4VMObRotAalUFea17 kbuhkXS+/e2+FnxP9cJaBtAMOpSfqUqLfp388G4T5qdjWKP2IUOVce9hTgIa5Cx+ NEbjEI0DhF1lBihWfaWNpvNhvbQXemvEzIbPHGhxlnqr6i24pazUrhRjKb82LMBD qiof6nEX57G69kBtiKf4EO9shp6MNOiM61tcMrG9WY4gdZ8gabJl9lYhuZwN4ZmF 4Ia+rFGk+knbacpkT4iNzzA6bVBnM3QQI0R7WnQvMyY1WOB3scWz93wLG/EgySpm 07jkYfWbxoqXxb4/5X4uNvUUQo5JWpj2S9exGm93rNBUWDsULgCx9pCGYsMqm65r BixFy2pJNh7VAU5y0B93r1gTn6d96LHzKKipiQa6yRGKn0Sz/f0GcfyTRvsxVfel D1bawy5xlELkZgD/1ajXjhg24OReYhjFuwqde6OnZW8GnT6tSZ8= =Uxuc -----END PGP SIGNATURE-----

Related news

Lepin EP-KP001 KP001_V19 Authentication Bypass

When analyzing the USB flash drive Lepin EP-KP001, Matthias Deeg found out that it uses an insecure hardware design which allows an attacker to bypass the password-based user authentication.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907