First published: Fri Jun 09 2023(Updated: )
An issue was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. When using Oracle Advanced Security (OAS) encryption, if an error is encountered initializing the encryption object used to encrypt data, the code falls back to a different encryption mechanism that uses an insecure random number generator to generate the private key. It is possible for a well-placed attacker to predict the output of this random number generator, which could lead to an attacker decrypting traffic between the driver and the database server. The vulnerability does not exist if SSL / TLS encryption is used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Datadirect Odbc Oracle Wire Protocol Driver | <08.02.2770 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in Progress DataDirect Connect for ODBC is CVE-2023-34363.
The severity level of this vulnerability is medium, with a severity value of 5.9.
The Progress DataDirect ODBC Oracle Wire Protocol Driver version up to 08.02.2770 is affected by this vulnerability.
The CWE category for this vulnerability is 338.
Yes, you can find more information about this vulnerability at the following references: [Reference 1](https://community.progress.com/s/article/Security-vulnerabilities-in-DataDirect-ODBC-Oracle-Wire-Protocol-driver-June-2023) and [Reference 2](https://progress.com).