CVE-2020-5360

7.5 HIGH

📋 TL;DR

Dell BSAFE Micro Edition Suite versions before 4.5 contain a buffer under-read vulnerability that allows unauthenticated remote attackers to cause undefined behavior or system crashes. This affects systems using the vulnerable cryptographic library for SSL/TLS or other security functions.

💻 Affected Systems

Products:
  • Dell BSAFE Micro Edition Suite
Versions: All versions prior to 4.5
Operating Systems: All platforms where BSAFE is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application or system using the vulnerable BSAFE library for cryptographic operations

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, though buffer under-reads typically cause crashes rather than RCE

🟠

Likely Case

Denial of service through application or system crashes, potentially disrupting SSL/TLS services

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though crashes could still occur

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Buffer under-read vulnerabilities require specific conditions to trigger and may be difficult to weaponize for RCE

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Download BSAFE Micro Edition Suite version 4.5 or later from Dell support. 2. Replace the vulnerable library files. 3. Restart affected applications/services. 4. Test functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to systems using BSAFE to trusted sources only

Application Firewall Rules

all

Implement firewall rules to block unexpected traffic patterns that could trigger the vulnerability

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks
  • Implement monitoring for crash events and abnormal behavior

🔍 How to Verify

Check if Vulnerable:

Check BSAFE library version in applications or system libraries. Versions before 4.5 are vulnerable.

Check Version:

Check application documentation or system library paths for BSAFE version information

Verify Fix Applied:

Verify BSAFE library version is 4.5 or later and test SSL/TLS functionality

📡 Detection & Monitoring

Log Indicators:

  • Application crashes
  • SSL/TLS handshake failures
  • Memory access violation errors

Network Indicators:

  • Abnormal SSL/TLS traffic patterns
  • Connection resets during cryptographic operations

SIEM Query:

search 'BSAFE' OR 'cryptographic failure' OR 'memory violation' in application logs

🔗 References

📤 Share & Export