RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to a Missing Required Cryptographic Step vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.
The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Link | Tags |
---|---|
https://www.oracle.com/security-alerts/cpujul2020.html | third party advisory patch |
https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®%3B-Crypto-J-Multiple-Security-Vulnerabilities | |
https://www.oracle.com/security-alerts/cpuoct2020.html | third party advisory patch |
https://kc.mcafee.com/corporate/index?page=content&id=SB10318 | third party advisory |
https://www.oracle.com/security-alerts/cpuApr2021.html | third party advisory patch |
https://www.oracle.com//security-alerts/cpujul2021.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpuoct2021.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |