CVE-2012-3006

The Innominate mGuard Smart HW before HW-101130 and BD before BD-101030, mGuard industrial RS, mGuard delta HW before HW-103060 and BD before BD-211010, mGuard PCI, mGuard blade, and EAGLE mGuard appliances with software before 7.5.0 do not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof (1) HTTPS or (2) SSH servers by predicting a key value.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:innominate:mguard_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:innominate:eagle_mguard_bd-301010:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:eagle_mguard_hw-201000:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_blade_hw-104020:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_blade_hw-104050:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_delta_bd-201000:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_delta_hw-103050:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_industrial_rs_bd-501000:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_industrial_rs_bd-501010:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_industrial_rs_bd-501020:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_industrial_rs_hw-105000:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_pci_bd-111010:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_pci_bd-111020:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_pci_hw-102020:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_pci_hw-102050:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_smart_bd-101010:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_smart_bd-101020:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_smart_hw-101020:-:*:*:*:*:*:*:*
cpe:2.3:h:innominate:mguard_smart_hw-101050:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:40

Type Values Removed Values Added
References () http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf - Vendor Advisory () http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf - Vendor Advisory
References () http://www.us-cert.gov/control_systems/pdf/ICSA-12-167-01.pdf - Broken Link, Third Party Advisory, US Government Resource () http://www.us-cert.gov/control_systems/pdf/ICSA-12-167-01.pdf - Broken Link, Third Party Advisory, US Government Resource
References () https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs - Not Applicable () https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs - Not Applicable

Information

Published : 2012-06-19 18:55

Updated : 2024-11-21 01:40


NVD link : CVE-2012-3006

Mitre link : CVE-2012-3006

CVE.ORG link : CVE-2012-3006


JSON object : View

Products Affected

innominate

  • mguard_blade_hw-104050
  • eagle_mguard_hw-201000
  • mguard_delta_bd-201000
  • mguard_blade_hw-104020
  • eagle_mguard_bd-301010
  • mguard_industrial_rs_bd-501020
  • mguard_delta_hw-103050
  • mguard_pci_hw-102020
  • mguard_smart_hw-101050
  • mguard_smart_hw-101020
  • mguard_pci_bd-111010
  • mguard_industrial_rs_bd-501000
  • mguard_industrial_rs_bd-501010
  • mguard_pci_hw-102050
  • mguard_smart_bd-101010
  • mguard_pci_bd-111020
  • mguard_firmware
  • mguard_industrial_rs_hw-105000
  • mguard_smart_bd-101020
CWE
CWE-310

Cryptographic Issues