Ribose RNP before 0.15.1 does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than on the tin of the algorithm.
References
Link | Resource |
---|---|
https://open.ribose.com/advisories/ra-2021-05-30/#CVE-2021-33589 | Exploit Vendor Advisory |
https://www.ribose.com/feedback/security | Broken Link |
https://open.ribose.com/advisories/ra-2021-05-30/#CVE-2021-33589 | Exploit Vendor Advisory |
https://www.ribose.com/feedback/security | Broken Link |
Configurations
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://open.ribose.com/advisories/ra-2021-05-30/#CVE-2021-33589 - Exploit, Vendor Advisory | |
References | () https://www.ribose.com/feedback/security - Broken Link |
Information
Published : 2023-04-21 12:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33589
Mitre link : CVE-2021-33589
CVE.ORG link : CVE-2021-33589
JSON object : View
Products Affected
ribose
- rnp
CWE
CWE-522
Insufficiently Protected Credentials