Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:samsung:850_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32302DB9-927F-4232-88DF-11C134266EBB", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:samsung:850_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "811049BE-1584-4E45-A157-1BEDBB74D6C0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:samsung:pm851_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9513E12E-A0EF-4789-8D2D-B97032C5A65C", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:samsung:pm851:-:*:*:*:*:*:*:*", "matchCriteriaId": "8040B236-B936-4642-8CF7-237CE39EE7F0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:seagate:st500lt015_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "05C36534-C9F5-4FE1-B8C8-5BA6D021C5C7", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:seagate:st500lt015:-:*:*:*:*:*:*:*", "matchCriteriaId": "E60BC85A-FE1F-44EB-A049-6EA987C48AE0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:seagate:st500lt025_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B999BEA-6A98-46B5-832F-76231DAA3BEA", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:seagate:st500lt025:-:*:*:*:*:*:*:*", "matchCriteriaId": "C625B6AD-4665-42EF-91DD-F45180719768", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Samsung 850 Pro and PM851 solid-state drives and Seagate ST500LT015 and ST500LT025 hard disk drives, when used on Windows and operating in Opal mode on Lenovo ThinkPad T440s laptops with BIOS 2.32 or ThinkPad W541 laptops with BIOS 2.21, or in Opal or eDrive mode on Dell Latitude E6410 laptops with BIOS A16 or Latitude E6430 laptops with BIOS A16, allow physically proximate attackers to bypass self-encrypting drive (SED) protection by triggering a soft reset and booting from an alternative OS, aka a \"Forced Restart Attack.\""}, {"lang": "es", "value": "Las unidades de estado s\u00f3lido Samsung 850 Pro y PM851 y las unidades de disco duro Seagate ST500LT015 y ST500LT025, cuando se utilizan en Windows y operan en modo Opal en port\u00e1tiles Lenovo ThinkPad T440s con BIOS 2.32 o port\u00e1tiles ThinkPad W541 con BIOS 2.21; o en modo Opal o eDrive en port\u00e1tiles Dell Latitude E6410 con BIOS A16; o port\u00e1tiles Latitude E6430 con BIOS A16, permiten que atacantes f\u00edsicamente cercanos omitan la protecci\u00f3n Self-Encrypting Drive (SED) desencadenando un restablecimiento parcial y arrancando desde un sistema operativo alternativo. Esto tambi\u00e9n se conoce como \"Forced Restart Attack\"."}], "id": "CVE-2015-7268", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 0.5, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-11-27T22:29:00.287", "references": [{"source": "cret@cert.org", "tags": ["Technical Description", "Third Party Advisory"], "url": "https://www.blackhat.com/docs/eu-15/materials/eu-15-Boteanu-Bypassing-Self-Encrypting-Drives-SED-In-Enterprise-Environments-wp.pdf"}, {"source": "cret@cert.org", "tags": ["Technical Description", "Third Party Advisory"], "url": "https://www.infoworld.com/article/3004913/encryption/self-encrypting-drives-are-hardly-any-better-than-software-based-encryption.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Technical Description", "Third Party Advisory"], "url": "https://www.blackhat.com/docs/eu-15/materials/eu-15-Boteanu-Bypassing-Self-Encrypting-Drives-SED-In-Enterprise-Environments-wp.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Technical Description", "Third Party Advisory"], "url": "https://www.infoworld.com/article/3004913/encryption/self-encrypting-drives-are-hardly-any-better-than-software-based-encryption.html"}], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-254"}], "source": "nvd@nist.gov", "type": "Primary"}]}