TITLE:
nCipher Products Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA19137
VERIFY ADVISORY:
http://secunia.com/advisories/19137/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From remote
OPERATING SYSTEM:
nCipher payShield
http://secunia.com/product/2831/
nCipher nShield
http://secunia.com/product/3096/
nCipher Document Sealing Engine (DSE 200)
http://secunia.com/product/8582/
nCipher KeepSecure
http://secunia.com/product/8581/
nCipher netHSM
http://secunia.com/product/3097/
nCipher nForce
http://secunia.com/product/8580/
SOFTWARE:
nCipher Cryptographic Hardware Interface Library (CHIL) 1.x
http://secunia.com/product/5479/
DESCRIPTION:
Some vulnerabilities have been reported in nCipher products, which
potentially can be exploited by malicious people to bypass certain
security restrictions.
1) An error in the HSM when choosing random parameters for use in the
generation Diffie-Hellman (DH) keys can cause weak private keys to be
generated. This can potentially be exploited to derive the private
key with significantly less effort than by brute force.
Successful exploitation requires access to the HSM and requires that
the DH keys are not generated using the Oakley group parameters.
The vulnerability has been reported in DH keys that are generated
using the following products:
2) A design weakness in the nCore API may cause application
programmers to implement weak MAC protocols that transmits a non-zero
IV together with the message. This may cause the application to fail
to detect certain modifications to messages that the CBC-MAC is
supposed to protect.
3) Certain functionality within the firmware that are meant for
testing purposes may be exploited to generate keys with reduced
security properties. This can potentially be exploited to derive keys
with significantly less effort than by brute force.
The vulnerability has been reported in the following products:
SOLUTION:
Update to V10 firmware version 2.22.6 or later. See vendor's original
advisory for non-affected firmware versions.
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
http://www.ncipher.com/support/advisories/keysigs/advis12.txt.asc
http://www.ncipher.com/support/advisories/keysigs/advis13.txt.asc
http://www.ncipher.com/support/advisories/keysigs/advis14.txt.asc
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.