Vulnerability Details : CVE-2021-32033
Protectimus SLIM NFC 70 10.01 devices allow a Time Traveler attack in which attackers can predict TOTP passwords in certain situations. The time value used by the device can be set independently from the used seed value for generating time-based one-time passwords, without authentication. Thus, an attacker with short-time physical access to a device can set the internal real-time clock (RTC) to the future, generate one-time passwords, and reset the clock to the current time. This allows the generation of valid future time-based one-time passwords without having further access to the hardware token.
Products affected by CVE-2021-32033
- cpe:2.3:o:protectimus:slim_nfc_70_firmware:10.01:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-32033
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-32033
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST | |
4.6
|
MEDIUM | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
0.9
|
3.6
|
NIST |
CWE ids for CVE-2021-32033
-
The product uses a Pseudo-Random Number Generator (PRNG) but does not correctly manage seeds.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-32033
-
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt
Exploit;Third Party Advisory
-
http://packetstormsecurity.com/files/163223/Protectimus-SLIM-NFC-Time-Manipulation.html
Protectimus SLIM NFC Time Manipulation ≈ Packet StormThird Party Advisory;VDB Entry;Exploit
-
http://seclists.org/fulldisclosure/2021/Jun/39
Full Disclosure: [SYSS-2021-007]: Protectimus SLIM NFC - External Control of System or Configuration Setting (CWE-15) (CVE-2021-32033)Mailing List;Third Party Advisory;Exploit
Jump to