Description
EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.
Published: 2017-02-03
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2016-9065 EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.
History

No history.

Subscriptions

Dell Bsafe Crypto-j
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-08-06T02:13:21.795Z

Reserved: 2016-09-13T00:00:00.000Z

Link: CVE-2016-8217

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-02-03T07:59:00.437

Modified: 2026-05-13T00:24:29.033

Link: CVE-2016-8217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses