VanDyke Software

Security Advisory

Security Advisory

VanDyke Software SecureCRT and SecureFX saved data vulnerable to brute-force attack

Risk assessment: Medium


Posted: November 3, 2022

Description

An external report claims that when using a brute-force attack, sensitive data, such as passwords, stored in the SecureCRT or SecureFX configuration without a configuration passphrase or with a weak configuration passphrase can be cracked in a relatively short amount of time. Direct access to the configuration data is required in order to exploit this vulnerability.

Products Affected

  • SecureCRT: versions 9.2.3 and earlier
  • SecureFX: versions 9.2.3 and earlier

Recommended Solutions

  • SecureCRT: Upgrade to version 9.3.0 and use a strong configuration passphrase.
  • SecureFX: Upgrade to version 9.3.0 and use a strong configuration passphrase.
  • In versions of SecureCRT and SecureFX prior to 9.3, use a strong configuration passphrase (minimum of 12 characters, mixed case, numbers, and symbols).

Notes regarding SecureCRT and SecureFX 9.3:

  • A stronger cryptographic algorithm is used to encrypt sensitive data stored in the configuration.
  • The UI for selecting the configuration passphrase indicates the strength of the passphrase as it’s being entered.

Vulnerability Fix Downloads

Revision History

November 3, 2022 – Security Advisory Published

VanDyke Software uses cookies to give you the best online experience. Before continuing to use this site, please confirm that you agree to our use of cookies. Please see our Cookie Usage for details.