SB2022071001 - Multiple vulnerabilities in Dell BSAFE Crypto-C and Micro Edition Suite
Published: July 10, 2022 Updated: January 19, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 13 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2020-35169)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
2) Information Exposure Through Timing Discrepancy (CVE-ID: CVE-2020-35168)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to observable timing discrepancy. A remote attacker can gain access to potentially sensitive information.3) Missing Required Cryptographic Step (CVE-ID: CVE-2020-29504)
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to a cryptographic issue. A remote attacker can perform MitM attack.
4) Key management errors (CVE-ID: CVE-2020-29505)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to a key management error. A remote attacker can trick the victim to open a specially crafted file and gain access to potentially sensitive information.
5) Information Exposure Through Timing Discrepancy (CVE-ID: CVE-2020-29506)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to observable timing discrepancy. A remote attacker can gain access to potentially sensitive information.
6) Information Exposure Through Timing Discrepancy (CVE-ID: CVE-2020-35164)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to observable timing discrepancy. A remote attacker can gain access to potentially sensitive information.7) Information Exposure Through Timing Discrepancy (CVE-ID: CVE-2021-21575)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to observable timing discrepancy. A remote attacker can gain access to potentially sensitive information.8) Input validation error (CVE-ID: CVE-2020-29507)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can gain access to sensitive information.
9) Input validation error (CVE-ID: CVE-2020-29508)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
10) Use of insufficiently random values (CVE-ID: CVE-2020-35163)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to usage of insufficiently random values. A remote attacker can perform brute-force attack and gain access to sensitive information.
11) Information Exposure Through Timing Discrepancy (CVE-ID: CVE-2020-35165)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to observable timing discrepancy. A remote attacker can gain access to potentially sensitive information.12) Information Exposure Through Timing Discrepancy (CVE-ID: CVE-2020-35166)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to observable timing discrepancy. A remote attacker can gain access to potentially sensitive information.13) Information Exposure Through Timing Discrepancy (CVE-ID: CVE-2020-35167)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to observable timing discrepancy. A remote attacker can gain access to potentially sensitive information.Remediation
Install update from vendor's website.