When formating removable storage cards, Motorola Good Mobile Messaging products may not properly delete old data.
Motorola Good Mobile Messaging products can create encrypted containers on removable media storage cards. During the process of creating the container old information on storage card may not be properly deleted.
Private information may remain on the storage card. If the card is lost, stolen, or redistributed the information could be obtained by a third party.
We are currently unaware of a practical solution to this problem.
Securely wipe storage cards
Administrators should use a data deletion tool that fills storage cards with data (overwriting private information) prior to using the cards in Good Mobile products. A similar process should be used when disposing or redistributing the cards.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: March 25, 2008 Updated: May 28, 2008
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector
Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal | 0 | E:ND/RL:ND/RC:ND
Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND
Thanks to Michael J. Iacovacci for reporting this vulnerability.
This document was written by Ryan Giobbi.
CVE IDs: | None
Severity Metric: | 0.09
Date Public: | 2008-03-24
Date First Published: | 2008-05-28
Date Last Updated: | 2008-05-29 11:37 UTC
Document Revision: | 14