First published: Sun Sep 18 2016(Updated: )
The client in EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.9 and 4.1.x before 4.1.5 places the weakest algorithms first in a signature-algorithm list transmitted to a server, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging server behavior in which the first algorithm is used.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
dell BSAFE | >=4.0.0<4.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0923 has a moderate severity rating due to its potential to weaken cryptographic protections.
To fix CVE-2016-0923, upgrade the EMC RSA BSAFE Micro Edition Suite to version 4.0.9 or 4.1.5 or later.
The risks include the possibility of remote attackers exploiting weak algorithms to compromise cryptographic mechanisms.
CVE-2016-0923 affects EMC RSA BSAFE Micro Edition Suite versions 4.0.0 through 4.0.8 and 4.1.0 through 4.1.4.
Organizations using vulnerable versions of EMC RSA BSAFE Micro Edition Suite for cryptographic operations are impacted by CVE-2016-0923.