A weakness has been reported in NeoScale Systems CryptoStor 700 Series, which can be exploited by malicious people to bypass certain security restrictions.
The system uses a two-factor authentication mechanism based on username and password combination and smartcard tokens. The validation of the smartcard is performed by an ActiveX control in a user's browser and can be bypassed by disabling ActiveX scripting.
Successful exploitation allows bypassing the smartcard part of the two-factor authentication, but still requires knowledge of a valid username and password to access the administrator console.
Solution: Update to firmware version 2.6.
Provided and/or discovered by: Reported in a US-CERT Vulnerability Note.
Original Advisory: US-CERT VU#339004:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: NeoScale Systems CryptoStor 700 Series Security Bypass Weakness
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.