Vulnerability Description
An issue was discovered in certain Verbatim drives through 2022-03-31. Due to insufficient firmware validation, an attacker can store malicious firmware code for the USB-to-SATA bridge controller on the USB drive (e.g., by leveraging physical access during the supply chain). This code is then executed. This affects Keypad Secure USB 3.2 Gen 1 Drive Part Number #49428, Store 'n' Go Secure Portable HDD GD25LK01-3637-C VER4.0, Executive Fingerprint Secure SSD GDMSFE01-INI3637-C VER1.1, and Fingerprint Secure Portable Hard Drive Part Number #53650.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Verbatim | Keypad Secure Usb 3.2 Gen 1 Firmware | <= 2022-03-31 |
| Verbatim | Keypad Secure Usb 3.2 Gen 1 | - |
| Verbatim | Store \'N\' Go Secure Portable Hdd Firmware | <= 2022-03-31 |
| Verbatim | Store \'N\' Go Secure Portable Hdd | - |
| Verbatim | Executive Fingerprint Secure Ssd Firmware | <= 2022-03-31 |
| Verbatim | Executive Fingerprint Secure Ssd | - |
| Verbatim | Fingerprint Secure Portable Hard Drive Firmware | <= 2022-03-31 |
| Verbatim | Fingerprint Secure Portable Hard Drive | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/167482/Verbatim-Keypad-Secure-USB-3.2-Gen-1ExploitMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/167508/Verbatim-Store-N-Go-Secure-Portable-ExploitMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/167535/Verbatim-Fingerprint-Secure-PortableExploitMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/167539/Verbatim-Executive-Fingerprint-SecurExploitMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2022/Jun/10ExploitMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2022/Jun/12ExploitMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2022/Jun/19ExploitMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2022/Jun/25ExploitMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2022/Oct/5Mailing ListThird Party Advisory
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-003.tExploitThird Party Advisory
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-007.tExploitThird Party Advisory
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-011.tExploitThird Party Advisory
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-016.tExploitThird Party Advisory
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-045.tExploitThird Party Advisory
- http://packetstormsecurity.com/files/167482/Verbatim-Keypad-Secure-USB-3.2-Gen-1ExploitMailing ListThird Party Advisory
FAQ
What is CVE-2022-28383?
CVE-2022-28383 is a vulnerability with a CVSS score of 6.8 (MEDIUM). An issue was discovered in certain Verbatim drives through 2022-03-31. Due to insufficient firmware validation, an attacker can store malicious firmware code for the USB-to-SATA bridge controller on t...
How severe is CVE-2022-28383?
CVE-2022-28383 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-28383?
Check the references section above for vendor advisories and patch information. Affected products include: Verbatim Keypad Secure Usb 3.2 Gen 1 Firmware, Verbatim Keypad Secure Usb 3.2 Gen 1, Verbatim Store \'N\' Go Secure Portable Hdd Firmware, Verbatim Store \'N\' Go Secure Portable Hdd, Verbatim Executive Fingerprint Secure Ssd Firmware.