Description Preview
Overview
The vulnerability in ENC DataVault and VaultAPI affects the password-based key derivation function, which is a critical security component that converts user passwords into encryption keys. Due to improper implementation, the key derivation process is weakened, allowing attackers to perform more efficient brute force attacks against user passwords. This vulnerability impacts USB drives from various manufacturers that license ENC Security's encryption technology. When exploited, an attacker could potentially gain unauthorized access to encrypted data stored on these drives. The issue is particularly concerning because users rely on this encryption to protect sensitive data stored on portable USB drives.
Remediation
Users should immediately update their ENC DataVault software to version 7.2 or later and ensure VaultAPI is updated to v67 or later. Specific steps include:
- Check the current version of your ENC DataVault or branded equivalent software (such as SanDisk SecureAccess).
- Download and install the latest version from your device manufacturer's official website.
- For SanDisk users, visit the Western Digital support site to obtain the updated SecureAccess software.
- After updating, consider changing your encryption passwords as a precautionary measure.
- If using affected drives in enterprise environments, ensure all instances of the software are updated across the organization.
Organizations should also consider implementing additional security controls such as multi-factor authentication for accessing sensitive data and monitoring for unusual access patterns to encrypted storage.
References
- ENC Security Update Advisory: https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software
- Western Digital Security Advisory: https://www.westerndigital.com/en-ap/support/product-security/wdc-21014-sandisk-secureaccess-software-update
- ENC Security Product Information: https://www.encsecurity.com/solutions.php
- Technical Analysis at RC3 2021: https://pretalx.c3voc.de/rc3-2021-r3s/talk/QMYGR3/
- CWE-307: Improper Restriction of Excessive Authentication Attempts: https://cwe.mitre.org/data/definitions/307.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade