Dell EMC RSA BSAFE Micro Edition Suite up to 4.0.10/4.1.6.0 PKCS #12 Data denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.0 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical has been found in Dell EMC RSA BSAFE Micro Edition Suite up to 4.0.10/4.1.6.0. This impacts an unknown function of the component PKCS #12 Data Handler. This manipulation causes denial of service. This vulnerability is handled as CVE-2018-11055. It is possible to launch the attack on the local host. There is not any exploit available. It is recommended to upgrade the affected component.
Details
A vulnerability was found in Dell EMC RSA BSAFE Micro Edition Suite up to 4.0.10/4.1.6.0. It has been declared as critical. Affected by this vulnerability is some unknown processing of the component PKCS #12 Data Handler. The manipulation with an unknown input leads to a denial of service vulnerability. The CWE definition for the vulnerability is CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6.1 (in 4.1.x), contains an Improper Clearing of Heap Memory Before Release ('Heap Inspection') vulnerability. Decoded PKCS #12 data in heap memory is not zeroized by MES before releasing the memory internally and a malicious local user could gain access to the unauthorized data by doing heap inspection.
The bug was discovered 08/28/2018. The weakness was released 08/31/2018 as not defined mailinglist post (Full-Disclosure). It is possible to read the advisory at seclists.org. This vulnerability is known as CVE-2018-11055 since 05/14/2018. Attacking locally is a requirement. Required for exploitation is a single authentication. The technical details are unknown and an exploit is not publicly available.
The vulnerability was handled as a non-public zero-day exploit for at least 3 days. During that time the estimated underground price was around $0-$5k.
Upgrading to version 4.0.11 or 4.1.6.1 eliminates this vulnerability.
Entries connected to this vulnerability are available at VDB-123450, VDB-123452, VDB-123453 and VDB-124067. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.dellemc.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.1VulDB Meta Temp Score: 5.0
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.5
NVD Vector: 🔍
CNA Base Score: 4.4
CNA Vector (Dell): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: RSA BSAFE Micro Edition Suite 4.0.11/4.1.6.1
Timeline
05/14/2018 🔍08/28/2018 🔍
08/31/2018 🔍
08/31/2018 🔍
09/01/2018 🔍
05/06/2023 🔍
Sources
Vendor: dellemc.comAdvisory: DSA-2018-128
Status: Not defined
CVE: CVE-2018-11055 (🔍)
GCVE (CVE): GCVE-0-2018-11055
GCVE (VulDB): GCVE-100-123451
See also: 🔍
Entry
Created: 09/01/2018 08:12Updated: 05/06/2023 12:06
Changes: 09/01/2018 08:12 (61), 03/19/2020 19:04 (1), 05/06/2023 11:59 (4), 05/06/2023 12:06 (12)
Complete: 🔍
Cache ID: 216::103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.