First published: Thu Mar 09 2006(Updated: )
nCipher HSM before 2.22.6, when generating a Diffie-Hellman public/private key pair without any specified DiscreteLogGroup parameters, chooses random parameters that could allow an attacker to crack the private key in significantly less time than a brute force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nCipher | ||
nCipher | =5.50 | |
nCipher | =5.54 | |
nCipher |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1115 is classified as a high severity vulnerability due to the potential for private key compromise.
To mitigate CVE-2006-1115, upgrade to nCipher HSM version 2.22.6 or later, which addresses the insecure key generation.
CVE-2006-1115 affects various versions of nCipher hardware security modules, including nCipher MSCAPI CSP and Ncipher Chil.
Exploiting CVE-2006-1115 allows an attacker to potentially derive private keys from weak Diffie-Hellman parameters.
CVE-2006-1115 arises from the generation of Diffie-Hellman keys without specifying secure discrete log group parameters.