// For flags

CVE-2007-6755

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.

El procedimiento por defecto del NIST SP 800-90A del algoritmo Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) contiene puntos constantes Q con una posible relación con ciertos valores "skeleton key", lo que podría permitir a atacantes dependientes del contexto romper mecanismos criptográficos de protección mediante el aprovechando del conocimiento de esos valores. NOTA: este es un CVE preliminar para Dual_EC_DRBG, la investigación futura puede brindar detalles adicionales sobre el punto Q y los ataques asociados, y podría potencialmente dar lugar a un RECAST o REJECT de esta CVE.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-10-11 CVE Reserved
  • 2013-10-11 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-04-02 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dell
Search vendor "Dell"
Bsafe Crypto-c-micro-edition
Search vendor "Dell" for product "Bsafe Crypto-c-micro-edition"
>= 3.0.0.0 <= 3.0.0.20
Search vendor "Dell" for product "Bsafe Crypto-c-micro-edition" and version " >= 3.0.0.0 <= 3.0.0.20"
-
Affected
Dell
Search vendor "Dell"
Bsafe Crypto-j
Search vendor "Dell" for product "Bsafe Crypto-j"
5.0
Search vendor "Dell" for product "Bsafe Crypto-j" and version "5.0"
-
Affected
Dell
Search vendor "Dell"
Bsafe Crypto-j
Search vendor "Dell" for product "Bsafe Crypto-j"
5.0.1
Search vendor "Dell" for product "Bsafe Crypto-j" and version "5.0.1"
-
Affected