TITLE: nCipher Products Multiple Vulnerabilities SECUNIA ADVISORY ID: SA19137 VERIFY ADVISORY: http://secunia.com/advisories/19137/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: nCipher payShield http://secunia.com/product/2831/ nCipher nShield http://secunia.com/product/3096/ nCipher Document Sealing Engine (DSE 200) http://secunia.com/product/8582/ nCipher KeepSecure http://secunia.com/product/8581/ nCipher netHSM http://secunia.com/product/3097/ nCipher nForce http://secunia.com/product/8580/ SOFTWARE: nCipher Cryptographic Hardware Interface Library (CHIL) 1.x http://secunia.com/product/5479/ DESCRIPTION: Some vulnerabilities have been reported in nCipher products, which potentially can be exploited by malicious people to bypass certain security restrictions. 1) An error in the HSM when choosing random parameters for use in the generation Diffie-Hellman (DH) keys can cause weak private keys to be generated. This can potentially be exploited to derive the private key with significantly less effort than by brute force. Successful exploitation requires access to the HSM and requires that the DH keys are not generated using the Oakley group parameters. The vulnerability has been reported in DH keys that are generated using the following products: * The "generatekey" utility, the MSCAPI or JCECSP provider, or via CHIL from nCipher software CD versions prior to v9.0. * An application that uses the nCore API. 2) A design weakness in the nCore API may cause application programmers to implement weak MAC protocols that transmits a non-zero IV together with the message. This may cause the application to fail to detect certain modifications to messages that the CBC-MAC is supposed to protect. 3) Certain functionality within the firmware that are meant for testing purposes may be exploited to generate keys with reduced security properties. This can potentially be exploited to derive keys with significantly less effort than by brute force. The vulnerability has been reported in the following products: * nShield PCI or SCSI * nForce PCI or SCSI * netHSM * payShield PCI, SCSI and net * SecureDB * DSE200 Document Sealing Engine (including those bundled with pdfProof) * Time Source Master Clock (TSMC) SOLUTION: Update to V10 firmware version 2.22.6 or later. See vendor's original advisory for non-affected firmware versions. * Weak DH keys must be discarded and replaced with newly generated keys. See vendor's original advisory for instructions. PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: http://www.ncipher.com/support/advisories/keysigs/advis12.txt.asc http://www.ncipher.com/support/advisories/keysigs/advis13.txt.asc http://www.ncipher.com/support/advisories/keysigs/advis14.txt.asc ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------