nCipher firmware before V10, as used by (1) nShield, (2) nForce, (3) netHSM, (4) payShield, (5) SecureDB, (6) DSE200 Document Sealing Engine, (7) Time Source Master Clock (TSMC), and possibly other products, contains certain options that were only intended for testing and not production, which might allow remote attackers to obtain information about encryption keys and crack those keys with less effort than brute force.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19137 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1015718 - Patch, Vendor Advisory | |
References | () http://www.ncipher.com/resources/97/sa14_presence_of_flaws_in_firmware_security - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/427151/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17012 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/0862 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25063 - |
Information
Published : 2006-03-09 13:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1117
Mitre link : CVE-2006-1117
CVE.ORG link : CVE-2006-1117
JSON object : View
Products Affected
ncipher
- nshield
- payshield
- time_source_master_clock
- nforce
- nethsm
- dse200_document_sealing_engine
- securedb
- ncore
CWE