First published: Tue Dec 30 2014(Updated: )
EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.6 and RSA BSAFE SSL-J before 6.1.4 do not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack."
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell BSAFE Micro Edition Suite | =4.0.0 | |
Dell BSAFE Micro Edition Suite | =4.0.1 | |
Dell BSAFE Micro Edition Suite | =4.0.2 | |
Dell BSAFE Micro Edition Suite | =4.0.3 | |
Dell BSAFE Micro Edition Suite | =4.0.4 | |
Dell BSAFE Micro Edition Suite | =4.0.5 | |
EMC RSA BSAFE SSL-J | <=6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4630 has been classified as a medium severity vulnerability due to the risk of man-in-the-middle attacks.
To fix CVE-2014-4630, update EMC RSA BSAFE Micro Edition Suite to version 4.0.6 or later and RSA BSAFE SSL-J to version 6.1.4 or later.
CVE-2014-4630 can lead to the exposure of sensitive information and possible modification of TLS sessions.
CVE-2014-4630 affects EMC RSA BSAFE Micro Edition Suite versions 4.0.0 through 4.0.5 and RSA BSAFE SSL-J versions up to 6.1.2.
CVE-2014-4630 allows man-in-the-middle attackers to intercept communication by not ensuring the server's X.509 certificate remains consistent during TLS renegotiation.