Vulnerability Details : CVE-2014-4192
The Dual_EC_DRBG implementation in EMC RSA BSAFE-C Toolkits (aka Share for C and C++) processes certain requests for output bytes by considering only the requested byte count and not the use of cached bytes, which makes it easier for remote attackers to obtain plaintext from TLS sessions by recovering the algorithm's inner state, a different issue than CVE-2007-6755.
Products affected by CVE-2014-4192
- cpe:2.3:a:dell:bsafe_share:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-4192
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-4192
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-4192
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-4192
-
http://dualec.org/
On the Practical Exploitability of Dual EC in TLS Implementations
-
http://dualec.org/DualECTLS.pdf
Jump to