First published: Fri Oct 11 2013(Updated: )
The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell BSAFE crypto-c-micro-edition | >=3.0.0.0<=3.0.0.20 | |
Dell BSAFE Crypto-J | =5.0 | |
Dell BSAFE Crypto-J | =5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6755 is considered a high severity vulnerability due to its potential to compromise cryptographic functions.
To mitigate CVE-2007-6755, it is recommended to update to a version of Dell BSAFE that does not use the vulnerable Dual_EC_DRBG algorithm.
CVE-2007-6755 affects the Dell BSAFE Crypto-C Micro Edition and BSAFE Crypto-J versions up to 5.0.1.
The risks of CVE-2007-6755 include potential exposure to cryptographic attacks that could lead to unauthorized access to sensitive data.
No, CVE-2007-6755 specifically impacts versions of the affected software up to certain specified limits, so newer versions should be assessed for security.