Vulnerability Details : CVE-2013-6078
The default configuration of EMC RSA BSAFE Toolkits and RSA Data Protection Manager (DPM) 20130918 uses the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by leveraging unspecified "security concerns," aka the ESA-2013-068 issue. NOTE: this issue has been SPLIT from CVE-2007-6755 because the vendor announcement did not state a specific technical rationale for a change in the algorithm; thus, CVE cannot reach a conclusion that a CVE-2007-6755 concern was the reason, or one of the reasons, for this change.
Products affected by CVE-2013-6078
- cpe:2.3:a:emc:rsa_bsafe_toolkits:-:*:*:*:*:*:*:*
- cpe:2.3:a:emc:rsa_data_protection_manager:20130918:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-6078
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-6078
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2013-6078
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6078
-
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
RSA warns developers not to use RSA products – A Few Thoughts on Cryptographic Engineering
-
http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
Stop using NSA-influenced code in our products, RSA tells customers | Ars Technica
-
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
The Wall Street Journal & Breaking News, Business, Financial and Economic News, World News and Video
-
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
In Wake of Latest Crypto Revelations, ‘Everything is Suspect’ | Threatpost
Jump to