Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-36751
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
ENC DataVault 7.2.3 and before, and OEM versions, use an encryption algorithm that is vulnerable to data manipulation (without knowledge of the key). This is called ciphertext malleability. There is no data integrity mechanism to detect this manipulation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Enc Security Enc DataVault 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Enc Security Enc DataVault是荷兰Enc Security公司的一种解决方案。将任何 Usb 驱动器变成一个安全的可移动磁盘,用于存放重要文件。 Enc Security ENC DataVault 7.2.3 版本存在数据伪造问题漏洞,该漏洞源于ENC DataVault使用了不适当的加密算法。攻击者可利用该漏洞(不知道密钥)可以对密文进行修改,这些修改会反映在修改后的明文中。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2021-36751
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-36751
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-36751

No comments yet


Leave a comment