8384 : Datakey Token/SmartCard Cleartext Transmission PIN Exposure
Printer | http://osvdb.org/8384 | Email This | Edit Vulnerability

Views This Week Views All Time Added to OSVDB Last Modified Modified (since 2008) Percent Complete
1 704 over 9 years ago about 6 years ago 0 times 90%

Timeline

Disclosure Date
2004-08-06

Description

Datakey's Rainbow iKey USB Token and Smart Card contain a flaw that may lead to an unauthorized password exposure. The issue is due to the communication channel between the token and the driver being plaintext. By sniffing communication channel between smartcard/token and smartcard driver, a remote attacker can retrive the user password, resulting in a loss of confidentiality.

Classification

Location: Remote / Network Access
Attack Type: Cryptographic
Impact: Loss of Confidentiality
Exploit: Exploit Public

Solution

Currently, there are no known workarounds or upgrades to correct this issue. However, Datakey has released a new firmware to address this vulnerability.

Products

Datakey
Smart Card
330
330i
330j
GSA compatible Smart Card
330g
Biometric-enabled Smart Card
330m
User PIN unblocking Smart Card
330u
Rainbow iKey USB Token
2032

References

Credit

Unknown or Incomplete

CVSSv2 Score

NVD does not currently have a CVSSv2 score assigned.

Comments

No Comments.

The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

© Copyright 2002 - 2014 Open Sourced Vulnerability Database (OSVDB), All Rights Reserved.
Privacy Statement - Terms of Use