ID

VAR-201206-0116


CVE

CVE-2012-3006


TITLE

plural Innominate Security Technologies In our products HTTPS Or SSH Vulnerability impersonating a server

Trust: 0.8

sources: JVNDB: JVNDB-2012-002806

DESCRIPTION

The Innominate mGuard Smart HW before HW-101130 and BD before BD-101030, mGuard industrial RS, mGuard delta HW before HW-103060 and BD before BD-211010, mGuard PCI, mGuard blade, and EAGLE mGuard appliances with software before 7.5.0 do not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof (1) HTTPS or (2) SSH servers by predicting a key value. Remote attackers can exploit this issue to perform man-in-the-middle attacks against vulnerable applications and to disclose sensitive information. Successful exploits may result in the attacker executing arbitrary code or gain unauthorized access on the affected system. The following products are affected: mGuard Smart mGuard PCI mGuard Industrial RS mGuard Blade mGuard Delta EAGLE mGuard. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Innominate mGuard Weak Entropy Key Generation Weakness SECUNIA ADVISORY ID: SA49632 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49632/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49632 RELEASE DATE: 2012-06-18 DISCUSS ADVISORY: http://secunia.com/advisories/49632/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49632/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49632 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness has been reported in Innominate mGuard, which can be exploited by malicious people to conduct brute force attacks. The weakness is reported versions prior to 7.5.0. Please see the vendor's advisory for the list of affected products. SOLUTION: Update to version 7.5.0. PROVIDED AND/OR DISCOVERED BY: Nadia Heninger (UCSD), Zakir Durumeric (UMICH), Eric Wustrow (UMICH), and J. Alex Halderman (UMICH). ORIGINAL ADVISORY: https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs/ ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-167-01.pdf Innominate: http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-3006 // JVNDB: JVNDB-2012-002806 // BID: 54033 // VULHUB: VHN-56287 // PACKETSTORM: 113830

AFFECTED PRODUCTS

vendor:innominatemodel:mguardscope:ltversion:7.5.0

Trust: 1.0

vendor:innominate securitymodel:eagle mguardscope:eqversion:hw-201000

Trust: 0.8

vendor:innominate securitymodel:eagle mguardscope:eqversion:bd-301010

Trust: 0.8

vendor:innominate securitymodel:mguard bladescope:eqversion:hw-104020

Trust: 0.8

vendor:innominate securitymodel:mguard bladescope:eqversion:hw-104050

Trust: 0.8

vendor:innominate securitymodel:mguard deltascope:eqversion:hw-103050

Trust: 0.8

vendor:innominate securitymodel:mguard deltascope:eqversion:bd-201000

Trust: 0.8

vendor:innominate securitymodel:mguard industrial rsscope:eqversion:hw-105000

Trust: 0.8

vendor:innominate securitymodel:mguard industrial rsscope:eqversion:bd-501000

Trust: 0.8

vendor:innominate securitymodel:mguard industrial rsscope:eqversion:bd-501010

Trust: 0.8

vendor:innominate securitymodel:mguard industrial rsscope:eqversion:bd-501020

Trust: 0.8

vendor:innominate securitymodel:mguard pciscope:eqversion:hw-102020

Trust: 0.8

vendor:innominate securitymodel:mguard pciscope:eqversion:hw-102050

Trust: 0.8

vendor:innominate securitymodel:mguard pciscope:eqversion:bd-111010

Trust: 0.8

vendor:innominate securitymodel:mguard pciscope:eqversion:bd-111020

Trust: 0.8

vendor:innominate securitymodel:mguard smartscope:eqversion:hw-101020

Trust: 0.8

vendor:innominate securitymodel:mguard smartscope:eqversion:hw-101050

Trust: 0.8

vendor:innominate securitymodel:mguard smartscope:eqversion:bd-101010

Trust: 0.8

vendor:innominate securitymodel:mguard smartscope:eqversion:bd-101020

Trust: 0.8

vendor:innominatemodel:mguard pciscope:eqversion:bd-111020

Trust: 0.6

vendor:innominatemodel:mguard bladescope:eqversion:hw-104020

Trust: 0.6

vendor:innominatemodel:mguard pciscope:eqversion:hw-102050

Trust: 0.6

vendor:innominatemodel:eagle mguardscope:eqversion:hw-201000

Trust: 0.6

vendor:innominatemodel:mguard pciscope:eqversion:bd-111010

Trust: 0.6

vendor:innominatemodel:mguard pciscope:eqversion:hw-102020

Trust: 0.6

vendor:innominatemodel:eagle mguardscope:eqversion:bd-301010

Trust: 0.6

vendor:innominatemodel:mguard deltascope:eqversion:bd-201000

Trust: 0.6

vendor:innominatemodel:mguard bladescope:eqversion:hw-104050

Trust: 0.6

vendor:innominatemodel:mguard deltascope:eqversion:hw-103050

Trust: 0.6

vendor:innominatemodel:mguard smart hw-101050scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard smart hw-101020scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard smart bd-101020scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard smart bd-101010scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard pci hw-102050scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard pci hw-102020scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard pci bd-111020scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard pci bd-111010scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard delta hw-103050scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard delta bd-201000scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard blade hw-104050scope: - version: -

Trust: 0.3

vendor:innominatemodel:mguard blade hw-104020scope: - version: -

Trust: 0.3

vendor:innominatemodel:industrial rs hw-105000scope: - version: -

Trust: 0.3

vendor:innominatemodel:industrial rs bd-501020scope: - version: -

Trust: 0.3

vendor:innominatemodel:industrial rs bd-501010scope: - version: -

Trust: 0.3

vendor:innominatemodel:industrial rs bd-501000scope: - version: -

Trust: 0.3

vendor:innominatemodel:eagle mguard hw-201000scope: - version: -

Trust: 0.3

vendor:innominatemodel:eagle mguard bd-301010scope: - version: -

Trust: 0.3

vendor:innominatemodel:delta hw-103050scope: - version: -

Trust: 0.3

vendor:innominatemodel:delta bd-201000scope: - version: -

Trust: 0.3

vendor:innominatemodel:blade hw-104050scope: - version: -

Trust: 0.3

vendor:innominatemodel:blade hw-104020scope: - version: -

Trust: 0.3

sources: BID: 54033 // JVNDB: JVNDB-2012-002806 // CNNVD: CNNVD-201206-265 // NVD: CVE-2012-3006

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3006
value: HIGH

Trust: 1.0

NVD: CVE-2012-3006
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201206-265
value: HIGH

Trust: 0.6

VULHUB: VHN-56287
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-3006
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56287
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56287 // JVNDB: JVNDB-2012-002806 // CNNVD: CNNVD-201206-265 // NVD: CVE-2012-3006

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-56287 // JVNDB: JVNDB-2012-002806 // NVD: CVE-2012-3006

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-265

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201206-265

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002806

PATCH

title:Top Pageurl:http://www.innominate.com/en

Trust: 0.8

title:ICS-VU-873212url:http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf

Trust: 0.8

title:Innominate Security Technologies mGuard Repair measures for weak entropy key generation vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97709

Trust: 0.6

sources: JVNDB: JVNDB-2012-002806 // CNNVD: CNNVD-201206-265

EXTERNAL IDS

db:ICS CERTid:ICSA-12-167-01

Trust: 2.9

db:NVDid:CVE-2012-3006

Trust: 2.8

db:JVNDBid:JVNDB-2012-002806

Trust: 0.8

db:CNNVDid:CNNVD-201206-265

Trust: 0.7

db:BIDid:54033

Trust: 0.4

db:SECUNIAid:49632

Trust: 0.2

db:VULHUBid:VHN-56287

Trust: 0.1

db:PACKETSTORMid:113830

Trust: 0.1

sources: VULHUB: VHN-56287 // BID: 54033 // JVNDB: JVNDB-2012-002806 // PACKETSTORM: 113830 // CNNVD: CNNVD-201206-265 // NVD: CVE-2012-3006

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-167-01.pdf

Trust: 2.9

url:http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf

Trust: 2.1

url:https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3006

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3006

Trust: 0.8

url:http://www.innominate.com/en/downloads/software-and-misc

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49632

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/49632/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/49632/

Trust: 0.1

url:https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-56287 // BID: 54033 // JVNDB: JVNDB-2012-002806 // PACKETSTORM: 113830 // CNNVD: CNNVD-201206-265 // NVD: CVE-2012-3006

CREDITS

Nadia Heninger, Eric Wustrow, and J. Alex Halderman, Zakir Durumeric

Trust: 0.6

sources: CNNVD: CNNVD-201206-265

SOURCES

db:VULHUBid:VHN-56287
db:BIDid:54033
db:JVNDBid:JVNDB-2012-002806
db:PACKETSTORMid:113830
db:CNNVDid:CNNVD-201206-265
db:NVDid:CVE-2012-3006

LAST UPDATE DATE

2025-04-11T23:04:13.559000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-56287date:2019-08-29T00:00:00
db:BIDid:54033date:2012-06-15T00:00:00
db:JVNDBid:JVNDB-2012-002806date:2012-06-21T00:00:00
db:CNNVDid:CNNVD-201206-265date:2019-08-30T00:00:00
db:NVDid:CVE-2012-3006date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-56287date:2012-06-19T00:00:00
db:BIDid:54033date:2012-06-15T00:00:00
db:JVNDBid:JVNDB-2012-002806date:2012-06-21T00:00:00
db:PACKETSTORMid:113830date:2012-06-18T04:32:45
db:CNNVDid:CNNVD-201206-265date:2012-06-26T00:00:00
db:NVDid:CVE-2012-3006date:2012-06-19T18:55:01.113