Vulnerability Details : CVE-2021-36751
ENC DataVault 7.2.3 and before, and OEM versions, use an encryption algorithm that is vulnerable to data manipulation (without knowledge of the key). This is called ciphertext malleability. There is no data integrity mechanism to detect this manipulation.
Products affected by CVE-2021-36751
- cpe:2.3:a:encsecurity:datavault:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-36751
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-36751
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST | |
4.2
|
MEDIUM | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
0.5
|
3.6
|
NIST |
CWE ids for CVE-2021-36751
-
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-36751
-
https://pretalx.c3voc.de/rc3-2021-r3s/talk/QMYGR3/
Practical bruteforce of military grade AES-1024 :: Remote Rhein Ruhr Stage :: pretalxThird Party Advisory
-
https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software
Security checkVendor Advisory
-
https://encsecurity.zendesk.com/hc/en-us/articles/7860771829533
Security checkVendor Advisory
Jump to