SanDisk Cruzer Enterprise USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program.Referenceshttp://www.syss.de/index.php?id=108&tx_ttnews%5Btt_news%5D=528&cHash=8d16fa63d9http://securitytracker.com/id?1023408http://www.sandisk.com/business-solutions/enterprise/technical-support/security-bulletin-december-2009http://it.slashdot.org/story/10/01/05/1734242/http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.htmlhttp://blogs.zdnet.com/hardware/?p=6655http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_SanDisk_USB-Stick.pdfhttp://www.vupen.com/english/advisories/2010/0078http://www.securityfocus.com/bid/37677https://exchange.xforce.ibmcloud.com/vulnerabilities/55475https://www.ironkey.com/usb-flash-drive-flaw-exposed