Sharp Zaurus PDA SL-5000D and SL-5500 uses a salt of "A0" to encrypt the screen-locking password as stored in the Security.conf file, which makes it easier for local users to guess the password via brute force methods.
Threat-Mapped Scoring
Score: 3.25
Priority: P2 - Serious (High)
S1 – Steal Customer Account Information
S9 – Sabotage of System/App (+0.25 bonus)
EPSS
Score: 0.00032Percentile:
0.07474
CVSS Scoring
CVSS v3.1 Score: 5.5
Severity: MEDIUM
Mapped CWE(s)
CWE-326
: Inadequate Encryption Strength
All CAPEC(s)
CAPEC-112 : Brute Force
CAPEC-192 : Protocol Analysis
CAPEC-20 : Encryption Brute Forcing
CAPEC(s) with Mapped TTPs
CAPEC-112 : Brute Force
Mapped TTPs:
Mapped ATT&CK TTPs
T1110
: Brute Force
Kill Chain: credential-access
Malware
APTs Threat Group Associations
Campaigns
2016 Ukraine Electric Power Attack
Operation Dream Job
Affected Products
cpe:2.3:o:sharp:zaurus_sl-5000d_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sharp:zaurus_sl-5500_firmware:-:*:*:*:*:*:*:*
← Back to Home
BrownCoat Threat Intelligence Platform | 2025 Steve Gray — You Can’t Take the Sky from Me