Microsoft ActiveSync 4.1, as used in Windows Mobile 5.0, uses weak encryption (XOR obfuscation with a fixed key) when sending the user's PIN/Password over the USB connection from the host to the device, which might make it easier for attackers to decode a PIN/Password obtained by (1) sniffing or (2) spoofing the docking process.
References
Link | Resource |
---|---|
http://osvdb.org/38499 | Broken Link |
http://securityreason.com/securityalert/3232 | Broken Link |
http://www.securityfocus.com/archive/1/482299/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/25976 | Broken Link Patch Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37223 | Third Party Advisory VDB Entry |
http://osvdb.org/38499 | Broken Link |
http://securityreason.com/securityalert/3232 | Broken Link |
http://www.securityfocus.com/archive/1/482299/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/25976 | Broken Link Patch Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37223 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2007-10-15 22:17
Updated : 2025-04-09 00:30
NVD link : CVE-2007-5460
Mitre link : CVE-2007-5460
CVE.ORG link : CVE-2007-5460
JSON object : View
Products Affected
microsoft
- windows_mobile
- activesync
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm