EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.
CVE Status: Modified
Attribute | Value |
---|---|
Attack Complexity | HIGH |
Attack Vector | NETWORK |
Availability Impact | NONE |
Base Score | 3.7 |
Base Severity | LOW |
Confidentiality Impact | LOW |
Integrity Impact | NONE |
Privileges Required | NONE |
Scope | UNCHANGED |
User Interaction | NONE |
Vector String | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
Exploitability Score | 2.2 |
Impact Score | 1.4 |
Source | [email protected] |
Type | Primary |