DSA-2019-022: Dell Wyse Password Encoder Hard Coded Cryptographic Key Vulnerability
Summary: Dell Wyse Password Encoder and ThinLinux2 have been updated to address a security vulnerability that may potentially be exploited by malicious users to compromise the affected system.
Impact
High
Details
The Dell Wyse Password Encoder in ThinLinux2 versions prior to 2.1.0.01 contain a hard coded Cryptographic Key vulnerability. An unauthenticated remote attacker could reverse engineer the cryptographic system used in the Dell Wyse Password Encoder to discover the hard coded private key and decrypt locally stored cipher text.
CVSSv3 Base Score: 7.9 (AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
The Dell Wyse Password Encoder in ThinLinux2 versions prior to 2.1.0.01 contain a hard coded Cryptographic Key vulnerability. An unauthenticated remote attacker could reverse engineer the cryptographic system used in the Dell Wyse Password Encoder to discover the hard coded private key and decrypt locally stored cipher text.
CVSSv3 Base Score: 7.9 (AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
Affected Products & Remediation
Affected products:
Dell Wyse Linux Thin Clients with ThinLinux2 version prior to 2.1.0.01
Remediation:
The following Dell ThinLinux2 release contains a resolution to the vulnerability:
- Dell ThinLinux2 versions 2.1.0.01 and later
Dell Technologies recommends all customers upgrade at the earliest opportunity. For more information, see Dell Knowledge Base article Drivers & Downloads FAQs.
Customers can download software from Dell Support at:
Affected products:
Dell Wyse Linux Thin Clients with ThinLinux2 version prior to 2.1.0.01
Remediation:
The following Dell ThinLinux2 release contains a resolution to the vulnerability:
- Dell ThinLinux2 versions 2.1.0.01 and later
Dell Technologies recommends all customers upgrade at the earliest opportunity. For more information, see Dell Knowledge Base article Drivers & Downloads FAQs.
Customers can download software from Dell Support at:
Acknowledgements
Dell would like to thank Andrew Tierney at Pen Test Partners for reporting this vulnerability.