CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
30.2%
It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | edge-main | noarch | cryptsetup | < 2.4.3-r0 | UNKNOWN |
Alpine | 3.12-main | noarch | cryptsetup | < 2.3.7-r0 | UNKNOWN |
Alpine | 3.13-main | noarch | cryptsetup | < 2.3.7-r0 | UNKNOWN |
Alpine | 3.14-main | noarch | cryptsetup | < 2.3.7-r0 | UNKNOWN |
Alpine | 3.15-main | noarch | cryptsetup | < 2.4.3-r0 | UNKNOWN |
Alpine | 3.16-main | noarch | cryptsetup | < 2.4.3-r0 | UNKNOWN |
Alpine | 3.17-main | noarch | cryptsetup | < 2.4.3-r0 | UNKNOWN |
Alpine | 3.18-main | noarch | cryptsetup | < 2.4.3-r0 | UNKNOWN |
Alpine | 3.19-main | noarch | cryptsetup | < 2.4.3-r0 | UNKNOWN |
Alpine | 3.20-main | noarch | cryptsetup | < 2.4.3-r0 | UNKNOWN |
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
30.2%