5.8
CVSSv2

CVE-2007-6755

Published: 11/10/2013 Updated: 01/11/2022
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 517
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent malicious users to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dell bsafe crypto-c-micro-edition

dell bsafe crypto-j 5.0.1

dell bsafe crypto-j 5.0

Vendor Advisories

The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values ...

Github Repositories

Gatecheck CI/CD Validation Tool

Gatecheck Gatecheck automates report validation in a CI/CD Pipeline by comparing security findings to a pre-determined thresholds It also provides report aggregation, artifact integrity, and deployment validation Gatecheck is stateless so self-hosting and provisioning servers is not required Upcoming Features The CLI is currently going through a much needed refactor Onc

anchore dockerio/library/debian:7 docker-compose exec api anchore-cli --u admin --p foobar image get dockerio/library/debian:7 | grep 'Analysis Status' Analysis Status: analyzing docker-compose exec api anchore-cli --u admin --p foobar image get dockerio/library/debian:7 | grep 'Analysis Status' Analysis Status: analyzing docker-compose exec api anchore-c

Docker Image Security in 5 minutes or less Introduction As the move to containers continues to take the industry by storm, container security has taken center stage as one of the hottest topics in 2019 and many organizations are scrambling to ensure they are equipped with the appropriate tools to enforce container security and compliance One important means of strengthening yo