The client in EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.9 and 4.1.x before 4.1.5 places the weakest algorithms first in a signature-algorithm list transmitted to a server, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging server behavior in which the first algorithm is used.
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2016/Sep/25 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/92994 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036835 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
16 Dec 2021, 18:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dell:bsafe:4.0.1:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.4:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.6:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.3:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.7:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.2:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.8:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.1.3:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.5:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.0:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.1.0:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.1.1:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.1.4:*:*:*:micro_edition_suite:*:*:* |
cpe:2.3:a:dell:bsafe:*:*:*:*:micro_edition_suite:*:*:* |
References | (SECTRACK) http://www.securitytracker.com/id/1036835 - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/92994 - Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://seclists.org/bugtraq/2016/Sep/25 - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
30 Nov 2021, 17:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:emc:rsa_bsafe:4.1.3:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.2:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.8:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.3:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.1.1:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.0:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.1.4:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.4:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.1:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.5:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.1.2:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:emc:rsa_bsafe:4.0.7:*:*:*:micro_edition_suite:*:*:* |
cpe:2.3:a:dell:bsafe:4.1.2:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.1:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.4:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.3:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.7:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.2:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.8:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.1.3:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.5:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.0.0:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.1.0:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.1.1:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe:4.1.4:*:*:*:micro_edition_suite:*:*:* |
Information
Published : 2016-09-18 02:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-0923
Mitre link : CVE-2016-0923
CVE.ORG link : CVE-2016-0923
JSON object : View
Products Affected
dell
- bsafe
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm