Описание
nCipher HSM before 2.22.6, when generating a Diffie-Hellman public/private key pair without any specified DiscreteLogGroup parameters, chooses random parameters that could allow an attacker to crack the private key in significantly less time than a brute force attack.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- Patch
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ncipher:chil:*:*:*:*:*:*:*:*
cpe:2.3:a:ncipher:mscapi_csp:5.50:*:*:*:*:*:*:*
cpe:2.3:a:ncipher:mscapi_csp:5.54:*:*:*:*:*:*:*
cpe:2.3:a:ncipher:ncipher_software_cd:*:*:*:*:*:*:*:*
EPSS
Процентиль: 67%
0.0054
Низкий
2.6 Low
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
nCipher HSM before 2.22.6, when generating a Diffie-Hellman public/private key pair without any specified DiscreteLogGroup parameters, chooses random parameters that could allow an attacker to crack the private key in significantly less time than a brute force attack.
EPSS
Процентиль: 67%
0.0054
Низкий
2.6 Low
CVSS2
Дефекты
NVD-CWE-Other