Ribose RNP before 0.15.1 does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than on the tin of the algorithm.
References
Link | Resource |
---|---|
https://open.ribose.com/advisories/ra-2021-05-30/#CVE-2021-33589 | Exploit Vendor Advisory |
https://www.ribose.com/feedback/security | Broken Link |
Configurations
History
03 May 2023, 10:36
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.ribose.com/feedback/security - Broken Link | |
References | (MISC) https://open.ribose.com/advisories/ra-2021-05-30/#CVE-2021-33589 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:ribose:rnp:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-522 |
21 Apr 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-21 12:15
Updated : 2024-02-04 23:37
NVD link : CVE-2021-33589
Mitre link : CVE-2021-33589
CVE.ORG link : CVE-2021-33589
JSON object : View
Products Affected
ribose
- rnp
CWE
CWE-522
Insufficiently Protected Credentials