First published: Thu Mar 09 2006(Updated: )
nCipher firmware before V10, as used by (1) nShield, (2) nForce, (3) netHSM, (4) payShield, (5) SecureDB, (6) DSE200 Document Sealing Engine, (7) Time Source Master Clock (TSMC), and possibly other products, contains certain options that were only intended for testing and not production, which might allow remote attackers to obtain information about encryption keys and crack those keys with less effort than brute force.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ncipher Securedb | ||
Ncipher Time Source Master Clock | ||
Ncipher Nforce | ||
Ncipher Dse200 Document Sealing Engine | ||
nCipher nCore | ||
Ncipher Nshield | ||
Ncipher Nethsm | =2.0 | |
Ncipher Nethsm | =2.1.12_cam5 | |
Ncipher Nethsm | =2.1 | |
Ncipher Payshield |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1117 is classified with a high severity due to the presence of testing options in the firmware that could introduce significant security risks.
To fix CVE-2006-1117, update the firmware to version V10 or later that removes the insecure testing options.
CVE-2006-1117 affects various nCipher products, including nShield, nForce, netHSM, payShield, SecureDB, DSE200 Document Sealing Engine, and Time Source Master Clock.
Yes, CVE-2006-1117 remains a concern due to the potential exploitation of testing features in production environments.
The best workaround for CVE-2006-1117 is to ensure affected devices are updated to secure firmware versions and to limit exposure of these devices to untrusted networks.