FKIE_CVE-1999-1174
Vulnerability from fkie_nvd - Published: 2001-12-21 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
ZIP drive for Iomega ZIP-100 disks allows attackers with physical access to the drive to bypass password protection by inserting a known disk with a known password, waiting for the ZIP drive to power down, manually replacing the known disk with the target disk, and using the known password to access the target disk.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| iomega | zip_100_mb_drive | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iomega:zip_100_mb_drive:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6606ECF-EB43-4B3C-AFEE-2D5979349562",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ZIP drive for Iomega ZIP-100 disks allows attackers with physical access to the drive to bypass password protection by inserting a known disk with a known password, waiting for the ZIP drive to power down, manually replacing the known disk with the target disk, and using the known password to access the target disk."
},
{
"lang": "es",
"value": "La unidad ZIP para discos Iomego ZIP-100 permite a atacantes con acceso f\u00edsico a la unidad permite evitar la protecci\u00f3n con contrase\u00f1a insertando un disco conocido con una contrase\u00f1a conocida, esperarando a que la unidad se pare y reemplazando manualmente el disco conocido por el disco objetivo."
}
],
"id": "CVE-1999-1174",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2001-12-21T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.counterpane.com/crypto-gram-9812.html#doghouse"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.counterpane.com/crypto-gram-9812.html#doghouse"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…