2024-12-08 03:06:42 +00:00

213 lines
6.2 KiB
JSON

{
"id": "CVE-2006-1117",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-03-09T13:06:00.000",
"lastModified": "2024-11-21T00:08:07.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "nCipher firmware before V10, as used by (1) nShield, (2) nForce, (3) netHSM, (4) payShield, (5) SecureDB, (6) DSE200 Document Sealing Engine, (7) Time Source Master Clock (TSMC), and possibly other products, contains certain options that were only intended for testing and not production, which might allow remote attackers to obtain information about encryption keys and crack those keys with less effort than brute force."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncipher:dse200_document_sealing_engine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD964801-9635-437D-9260-84F16619FC49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncipher:ncore:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FA410AE-0FC0-46DC-B89A-651DEDA51622"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncipher:nforce:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6252FF68-DB64-4BEC-86D9-A8517B0F9D64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncipher:securedb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6456DCB1-209C-4F63-83D0-1E73CC85F788"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncipher:time_source_master_clock:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F48A7766-4B50-4C25-8786-23DD88AFB7DB"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:ncipher:nethsm:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B802C8-58F9-4A03-BC1C-E2DA55CF1F8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:ncipher:nethsm:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C450BD00-9BCC-4E0F-83F9-BA5F0E293367"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:ncipher:nethsm:2.1.12_cam5:*:*:*:*:*:*:*",
"matchCriteriaId": "17A5415F-6D6E-4B08-8073-7462E82520C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:ncipher:nshield:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C008CC6B-6F9A-4541-97C5-7ED7C20349C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:ncipher:payshield:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D0EB90-3ADD-4038-91AB-AB76C5910951"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/19137",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1015718",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.ncipher.com/resources/97/sa14_presence_of_flaws_in_firmware_security",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/427151/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/17012",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/0862",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25063",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/19137",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1015718",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.ncipher.com/resources/97/sa14_presence_of_flaws_in_firmware_security",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/427151/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/17012",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/0862",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25063",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}