[原文]The Aladdin Knowledge Systems eToken device allows attackers with physical access to the device to obtain sensitive information without knowing the PIN of the owner by resetting the PIN in the EEPROM.
Aladdin Knowledge Systems eToken PIN Extraction 漏洞
Aladdin Knowledge Systems eToken设备存在漏洞，攻击者可以在不知道PIN所有者的情况下，通过复位EEPROM中PIN的物理手段访问设备的敏感信息。
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: email@example.com.
Aladdin Knowledge Systems eToken 3.3.3 eToken PIN Extraction Vulnerability (EDBID:19894)
Alladin Knowledge Systems eToken is a USB smartcard-like device used for authentication, file integrity, and encryption. Access to the eToken device itself and entering the PIN number encoded in the eToken will grant authorization to a local user.
The PIN number can be reset to the default value with the use of standard device programmers. This can be done by physically opening the eToken device (which can be done without leaving any trace or evidence of tampering) and copying the default PIN value to the location used to store either the user PIN or administrator PIN in the serial EEPROM.
Aladdin eToken USB Key allows a local/physical attacker to bypass the security provided by the device. The issue is due to the device offering no protection against physical attacks. If an attacker has access to the device, they can reset the legitimate user's PIN using cheap hardware to copy a specific 8-byte string from one area of the memory to another.
Currently, there are no known upgrades, patches, or workarounds available to
correct this issue.