The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of SafeGuard Enterprise Encryption

vulnerability 15250

Sophos Disk Encryption: disk access after sleep mode

Synthesis of the vulnerability

An attacker can wake up a sleeping computer with no authentication, in order to read or alter disk data, even if Sophos Disk Encryption is used.
Impacted products: SafeGuard Encryption.
Severity: 1/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: user console.
Creation date: 01/09/2014.
Identifiers: VIGILANCE-VUL-15250.

Description of the vulnerability

The Sophos Disk Encryption product can be managed by Sophos Enterprise Console (SEC).

When the Windows system is in sleep mode, an authentication is not always required when the system is awake. Usually, SEC changes the Windows configuration to require an authentication. However, this is not always done.

An attacker can therefore wake up a sleeping computer with no authentication, in order to read or alter disk data, even if Sophos Disk Encryption is used.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about SafeGuard Enterprise Encryption: