Vulnerability Note VU#339004

NeoScale Systems CryptoStor 700 series appliances fail to properly perform two-factor authentication

Original Release date: 18 Dec 2006 | Last revised: 03 Jan 2007


NeoScale Systems CryptoStor 700 series appliances fail to properly perform two-factor authentication. This can make it easier to bypass the CryptoStor authentication process.


NeoScale Systems CryptoStor Tape units are tape backup encryption appliances. CryptoStor 700 series units provide two-factor authentication for administration functions. This is accomplished with a smartcard token plus a username and password combination.

The smartcard aspect of the two-factor authentication is performed on the client side within the web browser, using ActiveX and script. Disabling ActiveX can bypass this part of the two-factor authentication.


An attacker with knowledge of only the username and password for the administration console can gain administrative access to the CryptoStor unit. This would allow an attacker to add, change, or delete encryption rules and keys, establish cluster members, export keys for archival, and more.


Apply an update

This issue is addressed in the 2.6 version of the CryptoStor Tape 700 Series firmware. According to NeoScale, this version of the firmware makes the following changes:

    a) changing the CryptoStor ActiveX component to not perform the actual authentication only to report on its success or failure. The CryptoStor ActiveX component version number was also changed.

    b) changes to the cgi-bin program within the CryptoStor Appliance to perform the actual authentication. The cgi-bin program was also modified to not work with the original version of the CryptoStor ActiveX component

    c) implementation of a Thawte certificate for the CryptoStor ActiveX component

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
NeoScale Systems, Inc.Affected10 Aug 200621 Dec 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2006-3896
  • Date Public: 18 Dec 2006
  • Date First Published: 18 Dec 2006
  • Date Last Updated: 03 Jan 2007
  • Severity Metric: 0.64
  • Document Revision: 12


If you have feedback, comments, or additional information about this vulnerability, please send us email.