First published: Tue Jun 17 2014(Updated: )
The default configuration of EMC RSA BSAFE Toolkits and RSA Data Protection Manager (DPM) 20130918 uses the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by leveraging unspecified "security concerns," aka the ESA-2013-068 issue. NOTE: this issue has been SPLIT from CVE-2007-6755 because the vendor announcement did not state a specific technical rationale for a change in the algorithm; thus, CVE cannot reach a conclusion that a CVE-2007-6755 concern was the reason, or one of the reasons, for this change.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA BSAFE Toolkits | ||
EMC RSA Data Protection Manager | =20130918 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6078 has a high severity rating, as it can significantly compromise cryptographic security.
To fix CVE-2013-6078, update the EMC RSA BSAFE Toolkits and RSA Data Protection Manager to the latest version that does not use the Dual_EC_DRBG algorithm.
CVE-2013-6078 affects the default configuration of EMC RSA BSAFE Toolkits and RSA Data Protection Manager version 20130918.
CVE-2013-6078 allows attackers to potentially predict cryptographic keys, thereby compromising the confidentiality and integrity of protected data.
Yes, CVE-2013-6078 has been linked to concerns about NSA influence on cryptographic standards, particularly the use of Dual_EC_DRBG.