Unrated severityNVD Advisory· Published Jan 7, 2010· Updated Apr 23, 2026
CVE-2010-0224
CVE-2010-0224
Description
SanDisk Cruzer Enterprise USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program.
Affected products
1- cpe:2.3:h:sandisk:cruzer_enterprise_usb:*:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- www.sandisk.com/business-solutions/enterprise/technical-support/security-bulletin-december-2009nvdVendor Advisory
- blogs.zdnet.com/hardware/nvd
- it.slashdot.org/story/10/01/05/1734242/nvd
- securitytracker.com/idnvd
- www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.htmlnvd
- www.securityfocus.com/bid/37677nvd
- www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_SanDisk_USB-Stick.pdfnvd
- www.syss.de/index.phpnvd
- www.vupen.com/english/advisories/2010/0078nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/55475nvd
- www.ironkey.com/usb-flash-drive-flaw-exposednvd
News mentions
0No linked articles in our index yet.