Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2024-22168

Disclosure Date: June 24, 2024 (last updated June 25, 2024)
A Cross-Site Scripting (XSS) vulnerability on the My Cloud, My Cloud Home, SanDisk ibi, and WD Cloud web apps was found which could allow an attacker to redirect the user to a crafted domain and reset their credentials, or to execute arbitrary client-side code in the user’s browser session to carry out malicious activities.The web apps for these devices have been automatically updated to resolve this vulnerability and improve the security of your devices and data.
0
Attacker Value
Unknown

CVE-2024-22167

Disclosure Date: March 13, 2024 (last updated June 25, 2024)
A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user's vault or has already gained access into a user's system. This attack is limited to the system in context and cannot be propagated.
0
Attacker Value
Unknown

CVE-2021-36750

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
ENC DataVault before 7.2 and VaultAPI v67 mishandle key derivation, making it easier for attackers to determine the passwords of all DataVault users (across USB drives sold under multiple brand names).
Attacker Value
Unknown

CVE-2019-13467

Disclosure Date: September 30, 2019 (last updated November 27, 2024)
Description: Western Digital SSD Dashboard before 2.5.1.0 and SanDisk SSD Dashboard before 2.5.1.0 applications are potentially vulnerable to man-in-the-middle attacks when the applications download resources from the Dashboard web service. This vulnerability may allow an attacker to substitute downloaded resources with arbitrary files.
Attacker Value
Unknown

CVE-2019-13466

Disclosure Date: September 30, 2019 (last updated November 27, 2024)
Western Digital SSD Dashboard before 2.5.1.0 and SanDisk SSD Dashboard before 2.5.1.0 have Incorrect Access Control. The “generate reports” archive is protected with a hard-coded password. An application update that addresses the protection of archive encryption is available.
Attacker Value
Unknown

CVE-2017-16560

Disclosure Date: November 16, 2017 (last updated November 08, 2023)
SanDisk Secure Access 3.01 vault decrypts and copies encrypted files to a temporary folder, where they can remain indefinitely in certain situations, such as if the file is being edited when the user exits the application or if the application crashes.
0
Attacker Value
Unknown

CVE-2010-0224

Disclosure Date: January 07, 2010 (last updated October 04, 2023)
SanDisk Cruzer Enterprise USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program.
0
Attacker Value
Unknown

CVE-2010-0226

Disclosure Date: January 07, 2010 (last updated October 04, 2023)
SanDisk Cruzer Enterprise USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext drive contents by providing a key that was captured in a USB data stream at an earlier time.
0
Attacker Value
Unknown

CVE-2010-0225

Disclosure Date: January 07, 2010 (last updated October 04, 2023)
SanDisk Cruzer Enterprise USB flash drives use a fixed 256-bit key for obtaining access to the cleartext drive contents, which makes it easier for physically proximate attackers to read or modify data by determining and providing this key.
0