DSA-2023-120: Dell BSAFE™ Micro Edition Suite Security Update

Résumé: Dell BSAFE Micro Edition Suite remediation is available to address a vulnerability that could be exploited by malicious users to compromise the affected system.

Cet article concerne Cet article ne concerne pas Cet article n’est associé à aucun produit spécifique. Toutes les versions du produit ne sont pas identifiées dans cet article.

Impact

Medium

Détails

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-28074 Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure.  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HThis hyperlink is taking you to a website outside of Dell Technologies.

 

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-28074 Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure.  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies recommande à tous les clients de prendre en compte à la fois le score de base CVSS et les scores temporels et environnementaux pertinents qui peuvent avoir un impact sur la gravité potentielle associée à une faille de sécurité donnée.

Produits concernés et mesure corrective

Product Affected Versions Remediated Versions Link
Dell BSAFE Micro Edition Suite Version 5.0 Versions 5.0.1 and 5.0.2.1 How To Request a Dell BSAFE product download
Dell BSAFE Micro Edition Suite Versions 4.0 through 4.6.1 Version 4.6.2 How To Request a Dell BSAFE product download
Dell BSAFE Crypto-C Micro Edition Versions 4.0 through 4.1.5 Versions MES 4.6.2 and MES 5.0.1 How To Request a Dell BSAFE product download
Product Affected Versions Remediated Versions Link
Dell BSAFE Micro Edition Suite Version 5.0 Versions 5.0.1 and 5.0.2.1 How To Request a Dell BSAFE product download
Dell BSAFE Micro Edition Suite Versions 4.0 through 4.6.1 Version 4.6.2 How To Request a Dell BSAFE product download
Dell BSAFE Crypto-C Micro Edition Versions 4.0 through 4.1.5 Versions MES 4.6.2 and MES 5.0.1 How To Request a Dell BSAFE product download
Note: This vulnerability does not impact BSAFE Crypto-C Micro Edition FIPS Module, but only impacts the SDK. Customers impacted by the BSAFE Crypto-C Micro Edition SDK vulnerability can upgrade to BSAFE Micro Edition Suite as per the announcement at https://www.dell.com/support/kbdoc/000205186

Customers running affected versions per the "Affected Products" table above should upgrade to Micro Edition Suite 5.0.2.1. 

The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.

Solutions de contournement et mesures d’atténuation

CVE ID Workaround and Mitigation
CVE-2023-28074 This issue can be mitigated by a workaround, if customer’s implementations are deemed to be vulnerable. Customers with an active maintenance contract can contact BSAFE Support for details about the workaround.

Historique des révisions

RevisionDateDescription
1.02023-04-13Initial release
1.12023-04-14Minor Update
2.02023-05-03Major Update
3.02023-09-18Major Update
4.02024-07-30Public Disclosure of CVE details
5.02024-08-20Revised CVE Description


 

 

Informations connexes

Produits concernés

BSAFE Crypto-C Micro Edition, BSAFE Micro Edition Suite, Product Security Information
Propriétés de l’article
Numéro d’article: 000212325
Type d’article: Dell Security Advisory
Dernière modification: 20 août 2024
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.