Useless without a description of the flaw
It seems kingston were being a bit economical with the truth about exactly what was being protected by AES.
A full description (in german) of the problem can be found here:
http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_Kingston_USB-Stick.pdf
My german is poor, but it seems that the code to unlock the drive is stored in a block of flash encrypted with what ever password you set, however this unlock code is the same for all units, so all you have to do is set a breakpoint on the decrypt routines of the unlock program so that after it has incorrectly decrypted the unlock code with the wrong password you can change the decrypted block to:
Hex dump ASCII
00 00 00 00|B5 D3 68 DC|8A 4D A5 B1|FD 2E 68 84| ....h?M.h
4D F2 0D 52|1E 2B F9 CD|00 00 00 00|00 00 00 00| M.R+........
and then let the program continue and it will unlock the drive, apparently the same code is used on all drives, and to think people paid good money for this, it looks like a deliberate backdoor so kingston can recover data for you as its a stunningly stupid way to do things.
Just use truecrypt and a cheap flash drive.