Dallas Semiconductor iButton DS1991 returns predictable values when given an incorrect password, which makes it easier for users with physical access to conduct dictionary attacks against the device password.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.atstake.com/research/advisories/2001/a011801-1.txt | Exploit Vendor Advisory | 
| http://www.kb.cert.org/vuls/id/178560 | Exploit Third Party Advisory US Government Resource | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/10625 | |
| http://www.atstake.com/research/advisories/2001/a011801-1.txt | Exploit Vendor Advisory | 
| http://www.kb.cert.org/vuls/id/178560 | Exploit Third Party Advisory US Government Resource | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/10625 | 
Configurations
                    History
                    20 Nov 2024, 23:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.atstake.com/research/advisories/2001/a011801-1.txt - Exploit, Vendor Advisory | |
| References | () http://www.kb.cert.org/vuls/id/178560 - Exploit, Third Party Advisory, US Government Resource | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/10625 - | 
Information
                Published : 2001-01-18 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-1436
Mitre link : CVE-2001-1436
CVE.ORG link : CVE-2001-1436
JSON object : View
Products Affected
                dallas_semiconductor
- ibutton
CWE
                