shockley.net

Credential, key, and source disclosure in Thales products (formerly Gemalto or Safenet)

Categories: [Security]

Overview

ProtectV and KeySecure "Next Generation" VM images include credentials for AWS EC2, ECR, and SES, DataDog API, and New Relic API license key. Several CA keys are also included.

Multiple AWS EC2 credentials had near-admin rights, potentially allowing malicious changes to the dev, build, and prod environments for several products. I don't believe logging was enabled, or if it was, nobody was reading the logs.

Source code and build environments for several products are also included in the build images, despite not being needed for the product. (For example, Docker containers included with ProtectV 4.7.3 even though that version doesn't use containers.)

By combining these issues with CVE-2021-XXXX an atacker could create a malicious Keysecure HSM to mount man-in-the-middle or DNS attacks, or review the source further to identify undiscovered vulnerabilities.

Note that I no longer have access to downloads for these products, and cannot verify if the credentials were removed or just changed.

Affected products

Vulnerability ID

CVE-2021-xxxxx (Waiting for number assignment by Thales)

Impact

Timeline