Skip to main content

CVE-2019-3728: CWE-125: Out-of-bounds Read in Dell RSA BSAFE Crypto-C Micro Edition

High
VulnerabilityCVE-2019-3728cvecve-2019-3728cwe-125
Published: Mon Sep 30 2019 (09/30/2019, 21:48:40 UTC)
Source: CVE
Vendor/Project: Dell
Product: RSA BSAFE Crypto-C Micro Edition

Description

RSA BSAFE Crypto-C Micro Edition versions from 4.0.0.0 before 4.0.5.4 and from 4.1.0 before 4.1.4, RSA BSAFE Micro Edition Suite versions from 4.0.0 before 4.0.13 and from 4.1.0 before 4.4 and RSA Crypto-C versions from 6.0.0 through 6.4.* are vulnerable to an out-of-bounds read vulnerability when processing DSA signature. A malicious remote user could potentially exploit this vulnerability to cause a crash in the library of the affected system.

AI-Powered Analysis

AILast updated: 07/04/2025, 10:41:05 UTC

Technical Analysis

CVE-2019-3728 is a high-severity vulnerability identified in multiple versions of Dell's RSA BSAFE Crypto-C Micro Edition and related suites. The flaw is classified as CWE-125, an out-of-bounds read vulnerability, which occurs during the processing of DSA (Digital Signature Algorithm) signatures. Specifically, versions 4.0.0.0 up to but not including 4.0.5.4, 4.1.0 up to but not including 4.1.4 of RSA BSAFE Crypto-C Micro Edition, versions 4.0.0 up to but not including 4.0.13 and 4.1.0 up to but not including 4.4 of RSA BSAFE Micro Edition Suite, and RSA Crypto-C versions 6.0.0 through 6.4.* are affected. The vulnerability allows a remote attacker to send specially crafted DSA signatures that trigger an out-of-bounds read in the cryptographic library, potentially causing the application or service using the library to crash (denial of service). The CVSS v3.1 base score is 7.5, reflecting a high severity with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability (causing crashes). There is no indication of confidentiality or integrity compromise. No known exploits have been reported in the wild, and no official patches or mitigation links are provided in the data, though newer versions presumably address the issue. This vulnerability is significant because RSA BSAFE Crypto libraries are widely used in embedded systems, security appliances, and enterprise software for cryptographic operations, meaning that vulnerable systems could be disrupted remotely without authentication.

Potential Impact

For European organizations, the impact of CVE-2019-3728 primarily involves potential denial of service conditions in systems relying on the affected RSA BSAFE Crypto-C Micro Edition libraries for cryptographic functions, especially DSA signature verification. This could affect secure communications, authentication processes, or cryptographic operations in critical infrastructure, financial services, telecommunications, and government systems. While the vulnerability does not lead to data leakage or unauthorized data modification, service interruptions could degrade availability of security-sensitive applications or devices, potentially disrupting business operations or critical services. Organizations using embedded devices or software components with these vulnerable libraries may face increased risk of remote crashes, which could be exploited by attackers to cause outages or trigger failover mechanisms, impacting operational continuity. Given the high reliance on cryptographic libraries in European industries for compliance and security, this vulnerability could undermine trust in affected systems until remediated.

Mitigation Recommendations

To mitigate CVE-2019-3728, European organizations should first identify all systems and software components using the affected versions of RSA BSAFE Crypto-C Micro Edition and related suites. This includes embedded devices, security appliances, and enterprise applications. Immediate steps include: 1) Upgrading to the latest patched versions of the RSA BSAFE libraries where the vulnerability is fixed; 2) If patches are unavailable, applying compensating controls such as network-level filtering to restrict access to services that perform DSA signature processing using the vulnerable libraries; 3) Implementing application-level input validation or rate limiting to reduce the risk of crafted malicious DSA signatures causing crashes; 4) Monitoring logs and system behavior for signs of unexpected crashes or service disruptions indicative of exploitation attempts; 5) Engaging with vendors and suppliers to confirm patch availability and deployment timelines; 6) For critical systems where immediate patching is not feasible, consider isolating vulnerable components or deploying redundant systems to maintain availability. Additionally, organizations should review cryptographic usage policies to evaluate if DSA signatures can be replaced with more modern algorithms less prone to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2019-01-03T00:00:00
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaea0

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 10:41:05 AM

Last updated: 7/28/2025, 2:33:37 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats