First published: Tue Feb 18 2014(Updated: )
The SSLEngine API implementation in EMC RSA BSAFE SSL-J 5.x before 5.1.3 and 6.x before 6.0.2 allows remote attackers to trigger the selection of a weak cipher suite by using the wrap method during a certain incomplete-handshake state.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA BSAFE SSL-J | =5.1.2 | |
EMC RSA BSAFE SSL-J | =6.0 | |
EMC RSA BSAFE Toolkits | =5.0 | |
EMC RSA BSAFE Toolkits | =5.1.0 | |
EMC RSA BSAFE Toolkits | =5.1.1 | |
EMC RSA BSAFE Toolkits | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0627 is considered a high-severity vulnerability due to its potential to allow remote attackers to exploit weak cipher suites.
To fix CVE-2014-0627, update the software to version 5.1.3 or later for 5.x, and version 6.0.2 or later for 6.x.
CVE-2014-0627 affects EMC RSA BSAFE SSL-J versions 5.0, 5.1.0, 5.1.1, 5.1.2, and 6.0, along with version 6.0.1.
CVE-2014-0627 enables remote attackers to force the selection of weak cipher suites during an incomplete handshake.
CVE-2014-0627 is no longer a concern once the software is properly updated to the specified versions.