nCipher firmware before V10, as used by (1) nShield, (2) nForce, (3) netHSM, (4) payShield, (5) SecureDB, (6) DSE200 Document Sealing Engine, (7) Time Source Master Clock (TSMC), and possibly other products, contains certain options that were only intended for testing and not production, which might allow remote attackers to obtain information about encryption keys and crack those keys with less effort than brute force.
References
Link | Resource |
---|---|
http://secunia.com/advisories/19137 | Patch Vendor Advisory |
http://securitytracker.com/id?1015718 | Patch Vendor Advisory |
http://www.ncipher.com/resources/97/sa14_presence_of_flaws_in_firmware_security | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/427151/100/0/threaded | |
http://www.securityfocus.com/bid/17012 | Patch |
http://www.vupen.com/english/advisories/2006/0862 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25063 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2006-03-09T11:00:00
Updated: 2018-10-18T14:57:01
Reserved: 2006-03-09T00:00:00
Link: CVE-2006-1117
JSON object: View
NVD Information
Status : Modified
Published: 2006-03-09T13:06:00.000
Modified: 2018-10-18T16:30:51.120
Link: CVE-2006-1117
JSON object: View
Redhat Information
No data.
CWE