First published: Thu Aug 20 2015(Updated: )
EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.8 and 4.1.x before 4.1.3 and RSA BSAFE SSL-C 2.8.9 and earlier do not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a similar issue to CVE-2015-0204.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
dell BSAFE | >=4.0.0<4.0.8 | |
dell BSAFE | >=4.1.0<4.1.3 | |
Dell BSAFE SSL-C | <=2.8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0535 has a medium severity rating due to its potential for cipher-downgrade attacks.
To fix CVE-2015-0535, upgrade to EMC RSA BSAFE Micro Edition Suite version 4.0.8 or 4.1.3 or later, and also update the RSA BSAFE SSL-C to version 2.8.10 or above.
CVE-2015-0535 is associated with the improper restriction of TLS state transitions that allow for potential cipher-downgrade attacks.
CVE-2015-0535 affects EMC RSA BSAFE Micro Edition Suite versions prior to 4.0.8 and 4.1.3, as well as RSA BSAFE SSL-C version 2.8.9 and earlier.
Attackers can exploit CVE-2015-0535 by sending crafted TLS traffic that manipulates cipher negotiations to weaken encryption.