Dell BSAFE Crypto-J 6.2.3

CPE Details

Dell BSAFE Crypto-J 6.2.3
6.2.3
2021-12-14
14h23 +00:00
2021-12-14
14h28 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:dell:bsafe_crypto-j:6.2.3:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

bsafe_crypto-j

Version

6.2.3

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-34381 2024-02-02 15h30 +00:00 Dell BSAFE SSL-J version 7.0 and all versions prior to 6.5, and Dell BSAFE Crypto-J versions prior to 6.2.6.1 contain an unmaintained third-party component vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to the compromise of the impacted system. This is a Critical vulnerability and Dell recommends customers to upgrade at the earliest opportunity.
9.8
Critique
CVE-2019-3740 2019-09-18 22h23 +00:00 RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys.
6.5
Moyen
CVE-2019-3739 2019-09-18 22h23 +00:00 RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA keys.
6.5
Moyen
CVE-2019-3738 2019-09-18 22h23 +00:00 RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to a Missing Required Cryptographic Step vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.
6.5
Moyen
CVE-2018-11070 2018-09-11 19h00 +00:00 RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key.
5.9
Moyen