CVE-2023-34363

An issue was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. When using Oracle Advanced Security (OAS) encryption, if an error is encountered initializing the encryption object used to encrypt data, the code falls back to a different encryption mechanism that uses an insecure random number generator to generate the private key. It is possible for a well-placed attacker to predict the output of this random number generator, which could lead to an attacker decrypting traffic between the driver and the database server. The vulnerability does not exist if SSL / TLS encryption is used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:progress:datadirect_odbc_oracle_wire_protocol_driver:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-06-09 07:15

Updated : 2023-06-21 12:54


NVD link : CVE-2023-34363

Mitre link : CVE-2023-34363

CVE.ORG link : CVE-2023-34363


JSON object : View

Products Affected

progress

  • datadirect_odbc_oracle_wire_protocol_driver
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)