Security Advisory
    VanDyke Software SecureCRT and SecureFX saved data vulnerable to brute-force attack
	Risk assessment: Medium
    
    Posted: November 3, 2022
				  
    Description
    
        An external report claims that when using a brute-force attack, sensitive data, such as passwords, stored in the SecureCRT or SecureFX configuration without a configuration passphrase or with a weak configuration passphrase can be cracked in a relatively short amount of time. Direct access to the configuration data is required in order to exploit this vulnerability.
    
	
    Products Affected
    
        
	      - SecureCRT: versions 9.2.3 and earlier
 
          - SecureFX: versions 9.2.3 and earlier
 
       
    
    Recommended Solutions
	
	    
	      - SecureCRT: Upgrade to version 9.3.0 and use a strong configuration passphrase.
 
          - SecureFX: Upgrade to version 9.3.0 and use a strong configuration passphrase.
 
          - In versions of SecureCRT and SecureFX prior to 9.3, use a strong configuration passphrase (minimum of 12 characters, mixed case, numbers, and symbols).
 
        
    
    Notes regarding SecureCRT and SecureFX 9.3:
	
        
	      - A stronger cryptographic algorithm is used to encrypt sensitive data stored in the configuration.
 
          - The UI for selecting the configuration passphrase indicates the strength of the passphrase as it’s being entered.
 
        
    
    Vulnerability Fix Downloads
	    
     Revision History
     
         November 3, 2022 – Security Advisory Published