This page was not yet optimized for use on mobile
devices.
RSA BSAFE® Crypto-J JSAFE and JCE Software Module 6.2.4
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #3172
Webpage information
Security policy
Symmetric Algorithms
AES, RC2, RC5, RC4, DES, Triple-DES, 3DES, TDES, HMACAsymmetric Algorithms
RSA-OAEP, ECDH, ECDSA, ECIES, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA1, SHA-224, SHA-384, SHA-256, SHA-512, SHA256, SHA224, SHA384, SHA512, SHA-2, MD5, RIPEMD160, scrypt, PBKDF2, PBKDFSchemes
MAC, Key AgreementProtocols
TLS, TLS 1.0, TLS 1.1, TLS 1.2Randomness
PRNG, DRBG, RNGElliptic Curves
P-224, P-256, P-384, P-521, B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSSecurity level
Level 1, Level 2Side-channel analysis
timing attacks, timing attackVulnerabilities
CVE-2019-3738Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 186-2, FIPS 198-1, FIPS 180-4, FIPS 186-4, FIPS140-2, FIPS186, SP 800-56A, SP 800-56B, SP 800-132, SP 800-135, SP 800-90A, SP 800-38A, SP 800-38C, SP 800-38D, SP 800-38E, SP 800-67, SP 800-52, SP 800-89, PKCS #5, PKCS #12, PKCS #1, RFC 5288, RFC 2246, RFC 4346, RFC 5246File metadata
| Title | RSA BSAFE Crypto-J JSAFE and JCE Software Module 6.2.4 Security Policy Level 1 |
|---|---|
| Keywords | "Dell BSAFE Crypto-J, RSA BSAFE Crypto-J JSAFE and JCE Software Module, 6.2, 6.2.1.1, fips security policy, level 1 |
| Author | Dell Technologies |
| Creation date | D:20100527131853Z |
| Modification date | D:20200824103053+10'00' |
| Pages | 40 |
| Creator | FrameMaker 11.0.2 |
| Producer | Acrobat Distiller 20.0 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on |
|---|---|---|---|---|
| Base score | ||||
| CVE-2018-11070 | MEDIUM | 5.9 | 11.09.2018 | |
| CVE-2019-3738 | MEDIUM | 6.5 | 18.09.2019 | |
| CVE-2019-3739 | MEDIUM | 6.5 | 18.09.2019 | |
| CVE-2019-3740 | MEDIUM | 6.5 | 18.09.2019 | |
| CVE-2022-34381 | CRITICAL | 9.8 | 02.02.2024 | |
| CVE-2025-26333 | HIGH | 7.5 | 25.09.2025 |
Showing 5 out of 6.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3172,
"dgst": "976d5deeab73696c",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES#5026",
"DRBG#1841",
"KAS#156",
"DSA#1321",
"CVL#1571",
"HMAC#3340",
"CVL#1572",
"SHS#4085",
"ECDSA#1283",
"CVL#1570",
"Triple-DES#2591",
"RSA#2711"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:dell:bsafe_crypto-j:6.2.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_crypto-j:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_crypto-j:6.2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_crypto-j:6.2.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"6.2.4"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2019-3739",
"CVE-2022-34381",
"CVE-2018-11070",
"CVE-2019-3740",
"CVE-2025-26333",
"CVE-2019-3738"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 13
},
"ECIES": {
"ECIES": 3
}
},
"FF": {
"DH": {
"DH": 13,
"Diffie-Hellman": 17
},
"DSA": {
"DSA": 24
}
},
"RSA": {
"RSA-OAEP": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CCM": {
"CCM": 2
},
"CFB": {
"CFB": 5
},
"CTR": {
"CTR": 14
},
"ECB": {
"ECB": 5
},
"GCM": {
"GCM": 3
},
"OFB": {
"OFB": 5
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 19,
"TLS 1.0": 1,
"TLS 1.1": 1,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 4
},
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-233": 1,
"B-283": 1,
"B-409": 1,
"B-571": 1,
"K-233": 1,
"K-283": 1,
"K-409": 1,
"K-571": 1,
"P-224": 2,
"P-256": 2,
"P-384": 2,
"P-521": 2
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 3,
"#12": 4,
"#1283": 1,
"#1321": 1,
"#156": 1,
"#1570": 1,
"#1571": 1,
"#1572": 1,
"#1841": 1,
"#2591": 1,
"#2711": 1,
"#3340": 1,
"#4085": 1,
"#5": 4,
"#5026": 1
}
},
"fips_certlike": {
"Certlike": {
"Certificate #5026 AES": 1,
"DSA (2048": 1,
"HMAC SHA256": 1,
"PKCS #1": 6,
"PKCS #12": 8,
"PKCS #5": 8,
"SHA-1": 7,
"SHA-2": 3,
"SHA-224": 2,
"SHA-256": 6,
"SHA-384": 4,
"SHA-512": 6,
"SHA1": 1,
"SHA224": 1,
"SHA256": 3,
"SHA384": 2,
"SHA512": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 11,
"Level 2": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
},
"PBKDF": {
"PBKDF": 5,
"PBKDF2": 3
},
"RIPEMD": {
"RIPEMD160": 2
},
"SHA": {
"SHA1": {
"SHA-1": 7,
"SHA1": 1
},
"SHA2": {
"SHA-2": 3,
"SHA-224": 3,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 5,
"SHA224": 1,
"SHA256": 3,
"SHA384": 2,
"SHA512": 2
}
},
"scrypt": {
"scrypt": 2
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.rsa.crypto": 4,
"com.rsa.crypto.jcm": 1,
"com.rsa.cryptoj.common.jcm": 1,
"com.rsa.cryptoj.jcm.module": 1
},
"java": {
"java.util.concurrent": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 53,
"PRNG": 4
},
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"SCA": {
"timing attack": 1,
"timing attacks": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 62,
"FIPS 180-4": 1,
"FIPS 186-2": 3,
"FIPS 186-4": 13,
"FIPS 198-1": 1,
"FIPS PUB 140-2": 1,
"FIPS140-2": 1,
"FIPS186": 1
},
"NIST": {
"SP 800-132": 1,
"SP 800-135": 1,
"SP 800-38A": 2,
"SP 800-38C": 1,
"SP 800-38D": 1,
"SP 800-38E": 1,
"SP 800-52": 1,
"SP 800-56A": 4,
"SP 800-56B": 1,
"SP 800-67": 1,
"SP 800-89": 4,
"SP 800-90A": 2
},
"PKCS": {
"PKCS #1": 3,
"PKCS #12": 4,
"PKCS #5": 4
},
"RFC": {
"RFC 2246": 1,
"RFC 4346": 1,
"RFC 5246": 1,
"RFC 5288": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 25
},
"RC": {
"RC2": 3,
"RC4": 2,
"RC5": 4
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDES": 1,
"Triple-DES": 25
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"HMAC": 23
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {
"CVE": {
"CVE-2019-3738": 2
}
}
},
"policy_metadata": {
"/Author": "Dell Technologies",
"/CreationDate": "D:20100527131853Z",
"/Creator": "FrameMaker 11.0.2",
"/Keywords": "\"Dell BSAFE Crypto-J, RSA BSAFE Crypto-J JSAFE and JCE Software Module, 6.2, 6.2.1.1, fips security policy, level 1",
"/ModDate": "D:20200824103053+10\u002700\u0027",
"/Producer": "Acrobat Distiller 20.0 (Windows)",
"/Title": "RSA BSAFE Crypto-J JSAFE and JCE Software Module 6.2.4 Security Policy Level 1",
"pdf_file_size_bytes": 350429,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3738",
"http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf",
"https://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf",
"http://csrc.nist.gov/index.html",
"http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "9674119282d4e46645bf263b8f8ba1282e53c88dc071db7896a736f5fbe7909f",
"policy_txt_hash": "ec73cfd62113f8e0027ec46e8632ead2ffd029f4ac6f45c4370a088f9a078d06"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/AprilConsolidated2018.pdf",
"date_sunset": null,
"description": "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Design Assurance: Level 3"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "RSA BSAFE\u00ae Crypto-J JSAFE and JCE Software Module 6.2.4",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "6.2.4",
"tested_conf": [
"Google(TM) ART(TM) JRE 8.0 on Google Android(TM) 7.1.2 ARMv8 (64 bit) running on Google Nexus(TM) 5X",
"OpenJDK 8.0 on CentOS 7.3 (64-bit) running on Dell PowerEdge (single-user mode)",
"Oracle(R) JRE 8.0 on Microsoft(R) Windows(R) 10 (64-bit) running on Dell(TM) Optiplex(TM)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-04-16",
"lab": "Gossamer Security Solutions",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2020-11-27",
"lab": "Gossamer Security Solutions",
"validation_type": "Update"
}
],
"vendor": "Dell Inc.",
"vendor_url": "http://www.rsa.com"
}
}