First published: Thu Mar 09 2006(Updated: )
nCipher HSM before 2.22.6, when generating a Diffie-Hellman public/private key pair without any specified DiscreteLogGroup parameters, chooses random parameters that could allow an attacker to crack the private key in significantly less time than a brute force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nCipher MSCAPI CSP | =5.50 | |
Ncipher Chil | ||
Ncipher Ncipher Software Cd | ||
nCipher MSCAPI CSP | =5.54 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.