Vulnerability Details CVE-2016-8217
EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.7%
CVSS Severity
CVSS v3 Score 3.7
CVSS v2 Score 4.3
Products affected by CVE-2016-8217
-
cpe:2.3:a:dell:bsafe_crypto-j:-
-
cpe:2.3:a:dell:bsafe_crypto-j:3.5
-
cpe:2.3:a:dell:bsafe_crypto-j:3.5.1
-
cpe:2.3:a:dell:bsafe_crypto-j:3.6
-
cpe:2.3:a:dell:bsafe_crypto-j:4.0
-
cpe:2.3:a:dell:bsafe_crypto-j:4.0.1
-
cpe:2.3:a:dell:bsafe_crypto-j:4.0.2
-
cpe:2.3:a:dell:bsafe_crypto-j:4.0.2.1
-
cpe:2.3:a:dell:bsafe_crypto-j:4.1
-
cpe:2.3:a:dell:bsafe_crypto-j:4.1.0.3
-
cpe:2.3:a:dell:bsafe_crypto-j:4.1.0.4
-
cpe:2.3:a:dell:bsafe_crypto-j:4.1.0.4.1
-
cpe:2.3:a:dell:bsafe_crypto-j:5.0
-
cpe:2.3:a:dell:bsafe_crypto-j:5.0.1
-
cpe:2.3:a:dell:bsafe_crypto-j:6.0
-
cpe:2.3:a:dell:bsafe_crypto-j:6.1
-
cpe:2.3:a:dell:bsafe_crypto-j:6.1.1
-
cpe:2.3:a:dell:bsafe_crypto-j:6.1.2
-
cpe:2.3:a:dell:bsafe_crypto-j:6.1.3
-
cpe:2.3:a:dell:bsafe_crypto-j:6.2
-
cpe:2.3:a:dell:bsafe_crypto-j:6.2.0.1
-
cpe:2.3:a:dell:bsafe_crypto-j:6.2.0.2
-
cpe:2.3:a:dell:bsafe_crypto-j:6.2.1