CVE-2021-26824
📋 TL;DR
CVE-2021-26824 is an authentication bypass vulnerability in DM FingerTool v1.19 on DM PD065 Secure USB devices. It allows local attackers to replay authentication data and gain full access to all USB features and stored data without proper credentials. This affects users of these specific USB devices with the vulnerable software.
💻 Affected Systems
- DM FingerTool
- DM PD065 Secure USB
📦 What is this software?
Dm Fingertool by Dm Fingertool Project
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of all encrypted/sensitive data stored on the USB device, including potential exposure of credentials, documents, and other protected information.
Likely Case
Unauthorized access to USB contents by someone with physical access to the device, leading to data theft or manipulation.
If Mitigated
Limited impact if USB is stored securely and access is physically controlled, though vulnerability remains present.
🎯 Exploit Status
Replay attack requires capturing authentication data, which can be done with physical access to the device during legitimate authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official vendor advisory found
Restart Required: No
Instructions:
No official patch available. Consider replacing affected USB devices with updated models or using alternative secure storage solutions.
🔧 Temporary Workarounds
Discontinue use of affected devices
allStop using DM PD065 Secure USB devices with FingerTool v1.19 for sensitive data storage
Implement additional encryption layer
allUse third-party encryption software (like VeraCrypt) on top of the USB's built-in protection
🧯 If You Can't Patch
- Physically secure USB devices when not in use (locked storage)
- Limit sensitive data stored on these devices and use alternative secure storage methods
🔍 How to Verify
Check if Vulnerable:
Check USB device model and FingerTool version. If using DM PD065 Secure USB with FingerTool v1.19, device is vulnerable.
Check Version:
Check FingerTool software version through its interface or documentation
Verify Fix Applied:
No fix available to verify. Consider device replacement as primary mitigation.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful access
- Unusual access patterns to USB contents
Network Indicators:
- Not applicable - local physical device attack
SIEM Query:
Not applicable for this physical device vulnerability