Last Modified: Dec. 9, 2021
EMC RSA BSAFE Micro Edition Suite (MES) 3.2.x before 3.2.6 and 4.0.x before 4.0.5 does not properly validate X.509 certificate chains, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate chain.
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: None
Base Score: 5.8
Exploitability Score: 8.6
Impact Score: 4.9
CVSS V2: AV:N/AC:M/Au:N/C:P/I:P/A:N
CWE-310
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.0:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.1:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.2:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.3:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.4:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.5:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.0:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.1:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.2:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.3:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell | |
cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.4:*:*:*:*:*:*:* Part: a Vendor: dell | Alle Schwachstellen für dell |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.0:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.1:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.2:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.3:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.4:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:3.2.5:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.0:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.1:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.2:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.3:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:dell:bsafe_micro-edition-suite:4.0.4:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <prop key="target" value="host"/> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="output"/> <prop key="program_influence" value="existence"/> </set> <prop key="data" value="any"/> <set operator="or"> <prop key="data_influence" value="read"/> <prop key="data_influence" value="write"/> <prop key="data_influence" value="delete"/> </set> <set operator="or"> <prop key="range" value="remote"/> <prop key="range" value="local"/> </set> </set>