Show plain JSON{"id": "CVE-2021-32033", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 1.9, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.6, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 0.9}]}, "published": "2021-06-16T12:15:12.693", "references": [{"url": "http://packetstormsecurity.com/files/163223/Protectimus-SLIM-NFC-Time-Manipulation.html", "tags": ["Third Party Advisory", "VDB Entry", "Exploit"], "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2021/Jun/39", "tags": ["Mailing List", "Third Party Advisory", "Exploit"], "source": "cve@mitre.org"}, {"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-335"}]}], "descriptions": [{"lang": "en", "value": "Protectimus SLIM NFC 70 10.01 devices allow a Time Traveler attack in which attackers can predict TOTP passwords in certain situations. The time value used by the device can be set independently from the used seed value for generating time-based one-time passwords, without authentication. Thus, an attacker with short-time physical access to a device can set the internal real-time clock (RTC) to the future, generate one-time passwords, and reset the clock to the current time. This allows the generation of valid future time-based one-time passwords without having further access to the hardware token."}, {"lang": "es", "value": "Los dispositivos Protectimus SLIM NFC 70 versiones 10.01, permiten un ataque Time Traveler en el que atacantes pueden predecir las contrase\u00f1as TOTP en determinadas situaciones. El valor del tiempo usado por el dispositivo se puede establecer independientemente del valor de la semilla usada para generar contrase\u00f1as de un solo uso basadas en el tiempo, sin autenticaci\u00f3n. As\u00ed, un atacante con acceso f\u00edsico de corta duraci\u00f3n a un dispositivo puede ajustar el reloj interno de tiempo real (RTC) al futuro, generar contrase\u00f1as de un solo uso y restablecer el reloj a la hora actual. Esto permite la generaci\u00f3n de contrase\u00f1as de un solo uso v\u00e1lidas en el futuro sin tener m\u00e1s acceso al token de hardware"}], "lastModified": "2022-07-12T17:42:04.277", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:protectimus:slim_nfc_70_firmware:10.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "858F7C04-B89F-4D4E-A2FA-5E4772026541"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:protectimus:slim_nfc_70:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "23331DEC-0768-4584-90FD-03107F2A041A"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}