Show plain JSON{"id": "CVE-2010-0222", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2010-01-07T19:30:00.497", "references": [{"url": "http://blogs.zdnet.com/hardware/?p=6655", "source": "cve@mitre.org"}, {"url": "http://it.slashdot.org/story/10/01/05/1734242/", "source": "cve@mitre.org"}, {"url": "http://news.zdnet.co.uk/security/0%2C1000000189%2C39963327%2C00.htm", "source": "cve@mitre.org"}, {"url": "http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html", "source": "cve@mitre.org"}, {"url": "http://www.kingston.com/driveupdate/", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_Kingston_USB-Stick.pdf", "source": "cve@mitre.org"}, {"url": "http://www.syss.de/index.php?id=108&tx_ttnews%5Btt_news%5D=528&cHash=8d16fa63d9", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2010/0080", "source": "cve@mitre.org"}, {"url": "https://www.ironkey.com/usb-flash-drive-flaw-exposed", "source": "cve@mitre.org"}, {"url": "http://blogs.zdnet.com/hardware/?p=6655", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://it.slashdot.org/story/10/01/05/1734242/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://news.zdnet.co.uk/security/0%2C1000000189%2C39963327%2C00.htm", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kingston.com/driveupdate/", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_Kingston_USB-Stick.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.syss.de/index.php?id=108&tx_ttnews%5Btt_news%5D=528&cHash=8d16fa63d9", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2010/0080", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.ironkey.com/usb-flash-drive-flaw-exposed", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-310"}]}], "descriptions": [{"lang": "en", "value": "Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives use a fixed 256-bit key for obtaining access to the cleartext drive contents, which makes it easier for physically proximate attackers to read or modify data by determining and providing this key."}, {"lang": "es", "value": "Los dispositivos USB Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), y DataTraveler Elite Privacy Edition (DTEP), emplean una clave de 256 bit para obtener acceso a los contenidos del dispositivo, lo que facilita a atacantes cercanos f\u00edsicamente, leer o modificar los datos empleando esta clave."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:kingston:datatraveler_blackbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBB91653-9096-47B8-9238-3F11F70979F6"}, {"criteria": "cpe:2.3:h:kingston:datatraveler_elite:*:*:privacy:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EC727F1-07ED-4FA1-B7F9-3F0499ABE62A"}, {"criteria": "cpe:2.3:h:kingston:datatraveler_secure:*:*:privacy:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B7C3258-1FD3-490C-85A3-42EA85AB2664"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}