nCipher firmware before V10, as used by (1) nShield, (2) nForce, (3) netHSM, (4) payShield, (5) SecureDB, (6) DSE200 Document Sealing Engine, (7) Time Source Master Clock (TSMC), and possibly other products, contains certain options that were only intended for testing and not production, which might allow remote attackers to obtain information about encryption keys and crack those keys with less effort than brute force.
References
Link | Resource |
---|---|
http://www.ncipher.com/resources/97/sa14_presence_of_flaws_in_firmware_security | Patch Vendor Advisory |
http://www.securityfocus.com/bid/17012 | Patch |
http://securitytracker.com/id?1015718 | Patch Vendor Advisory |
http://secunia.com/advisories/19137 | Patch Vendor Advisory |
http://www.vupen.com/english/advisories/2006/0862 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25063 | |
http://www.securityfocus.com/archive/1/427151/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2006-03-09 05:06
Updated : 2018-10-18 09:30
NVD link : CVE-2006-1117
Mitre link : CVE-2006-1117
JSON object : View
CWE
Products Affected
ncipher
- dse200_document_sealing_engine
- payshield
- ncore
- nforce
- time_source_master_clock
- nshield
- securedb
- nethsm