CVE-2024-29171

5.9 MEDIUM

📋 TL;DR

Dell BSAFE SSL-J contains an improper certificate verification vulnerability that could allow a remote attacker to intercept or manipulate encrypted communications. This affects systems using vulnerable versions of Dell BSAFE SSL-J for Java-based applications. The vulnerability could lead to information disclosure through man-in-the-middle attacks.

💻 Affected Systems

Products:
  • Dell BSAFE SSL-J
Versions: Versions prior to 6.6 and versions 7.0 through 7.2
Operating Systems: All operating systems running Java applications using BSAFE SSL-J
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any Java application using the vulnerable BSAFE SSL-J library for SSL/TLS operations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of encrypted communications, allowing attackers to intercept sensitive data including credentials, financial information, and other confidential data transmitted over SSL/TLS connections.

🟠

Likely Case

Selective interception of unencrypted data within SSL/TLS sessions, potentially exposing sensitive information but requiring attacker positioning in the network path.

🟢

If Mitigated

Limited impact due to network segmentation, certificate pinning, or additional security controls that detect anomalous certificate behavior.

🌐 Internet-Facing: MEDIUM - Internet-facing systems could be targeted by attackers positioned to intercept traffic, but exploitation requires specific network positioning.
🏢 Internal Only: LOW - Internal systems are less likely to be targeted unless attackers have already gained internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires the attacker to be positioned as a man-in-the-middle, which adds complexity but doesn't require authentication to the target system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 6.6 or 7.3 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000226620/dsa-2024-221-security-update-for-dell-bsafe-ssl-j-multiple-vulnerabilities

Restart Required: Yes

Instructions:

1. Download the updated BSAFE SSL-J library from Dell support. 2. Replace the vulnerable library files in your Java application. 3. Restart all Java applications using the library. 4. Verify the updated version is being used.

🔧 Temporary Workarounds

Certificate Pinning Implementation

all

Implement certificate pinning in applications to validate server certificates against known good certificates, preventing man-in-the-middle attacks even with improper verification.

Network Segmentation

all

Segment networks to limit potential man-in-the-middle positioning and monitor for unusual SSL/TLS certificate changes.

🧯 If You Can't Patch

  • Implement network monitoring for SSL/TLS certificate anomalies and unexpected certificate changes
  • Use application-level encryption for sensitive data in addition to SSL/TLS

🔍 How to Verify

Check if Vulnerable:

Check the BSAFE SSL-J library version in your Java application's classpath or dependencies. Vulnerable versions are prior to 6.6 and 7.0-7.2.

Check Version:

Check Java application dependencies or run: java -cp [path-to-bsafe-jar] com.dell.bsafe.VersionInfo

Verify Fix Applied:

Verify the BSAFE SSL-J library version is 6.6 or higher (if using 6.x) or 7.3 or higher (if using 7.x). Test SSL/TLS connections to ensure proper certificate validation.

📡 Detection & Monitoring

Log Indicators:

  • SSL/TLS handshake failures with certificate validation errors
  • Unexpected certificate changes in SSL/TLS sessions

Network Indicators:

  • Unusual SSL/TLS certificate issuers or subjects in network traffic
  • Man-in-the-middle attack patterns in network monitoring

SIEM Query:

ssl.certificate.issuer != "expected-issuer" OR ssl.certificate.subject != "expected-subject"

🔗 References

📤 Share & Export