CVE-2015-7268
MEDIUM
4,2
Source: [email protected]
Attack Vector: physical
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
LOW
1,9
Source: [email protected]
Access Vector: local
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
Samsung 850 Pro and PM851 solid-state drives and Seagate ST500LT015 and ST500LT025 hard disk drives, when used on Windows and operating in Opal mode on Lenovo ThinkPad T440s laptops with BIOS 2.32 or ThinkPad W541 laptops with BIOS 2.21, or in Opal or eDrive mode on Dell Latitude E6410 laptops with BIOS A16 or Latitude E6430 laptops with BIOS A16, allow physically proximate attackers to bypass self-encrypting drive (SED) protection by triggering a soft reset and booting from an alternative OS, aka a 'Forced Restart Attack.'
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0006
Percentile
0,2th
Updated
EPSS Score Trend (Last 91 Days)
Operating System
St500Lt015 Firmware by Seagate
CPE Identifier
View Detailed Analysis
cpe:2.3:o:seagate:st500lt015_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
St500Lt025 Firmware by Seagate
CPE Identifier
View Detailed Analysis
cpe:2.3:o:seagate:st500lt025_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
850 Pro Firmware by Samsung
CPE Identifier
View Detailed Analysis
cpe:2.3:o:samsung:850_pro_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Pm851 Firmware by Samsung
CPE Identifier
View Detailed Analysis
cpe:2.3:o:samsung:pm851_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.blackhat.com/docs/eu-15/materials/eu-15-Boteanu-Bypassing-Self-Encr…
https://www.infoworld.com/article/3004913/encryption/self-encrypting-drives-are…
https://www.blackhat.com/docs/eu-15/materials/eu-15-Boteanu-Bypassing-Self-Encr…
https://www.infoworld.com/article/3004913/encryption/self-encrypting-drives-are…