Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 18 Sep 2024 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keyfactor
Keyfactor ejbca |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:keyfactor:ejbca:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Keyfactor
Keyfactor ejbca |
|
| Metrics |
cvssV3_1
|
Thu, 12 Sep 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Sep 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The CMP CLI client in KeyFactor EJBCA before 8.3.1 has only 6 octets of salt, and is thus not compliant with the security requirements of RFC 4211, and might make man-in-the-middle attacks easier. CMP includes password-based MAC as one of the options for message integrity and authentication (the other option is certificate-based). RFC 4211 section 4.4 requires that password-based MAC parameters use a salt with a random value of at least 8 octets. This helps to inhibit dictionary attacks. Because the standalone CMP client originally was developed as test code, the salt was instead hardcoded and only 6 octets long. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-25T16:10:43.486Z
Reserved: 2024-05-19T00:00:00.000Z
Link: CVE-2024-36066
Updated: 2024-09-12T20:19:48.754Z
Status : Modified
Published: 2024-09-12T19:15:03.567
Modified: 2025-03-25T17:15:56.690
Link: CVE-2024-36066
No data.
OpenCVE Enrichment
No data.