Описание
Sun Ray Server Software 4.0 and 4.1 does not generate a unique DSA private key for the firmware on each Sun Ray 1, 1g, 100, and 150 DTU device, which makes it easier for remote attackers to obtain sensitive information by predicting a key and then using it to decrypt sniffed network traffic.
Ссылки
- Patch
- Vendor Advisory
- Patch
- Vendor Advisory
- Patch
- Vendor Advisory
- Patch
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:sun:ray_server_software:4.0:*:linux:*:*:*:*:*
cpe:2.3:a:sun:ray_server_software:4.0:*:sparc:*:*:*:*:*
cpe:2.3:a:sun:ray_server_software:4.0:*:x86:*:*:*:*:*
cpe:2.3:a:sun:ray_server_software:4.1:*:linux:*:*:*:*:*
cpe:2.3:a:sun:ray_server_software:4.1:*:sparc:*:*:*:*:*
cpe:2.3:a:sun:ray_server_software:4.1:*:x86:*:*:*:*:*
EPSS
Процентиль: 58%
0.00372
Низкий
7.8 High
CVSS2
Дефекты
CWE-310
Связанные уязвимости
github
почти 4 года назад
Sun Ray Server Software 4.0 and 4.1 does not generate a unique DSA private key for the firmware on each Sun Ray 1, 1g, 100, and 150 DTU device, which makes it easier for remote attackers to obtain sensitive information by predicting a key and then using it to decrypt sniffed network traffic.
EPSS
Процентиль: 58%
0.00372
Низкий
7.8 High
CVSS2
Дефекты
CWE-310