thalesgroup CVE Vulnerabilities & Metrics

Focus on thalesgroup vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About thalesgroup Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with thalesgroup. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total thalesgroup CVEs: 11
Earliest CVE date: 03 Oct 2019, 14:15 UTC
Latest CVE date: 23 May 2024, 09:15 UTC

Latest CVE reference: CVE-2024-5264

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical thalesgroup CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.13

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 3
7.0-8.9 3
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS thalesgroup CVEs

These are the five CVEs with the highest CVSS scores for thalesgroup, sorted by severity first and recency.

All CVEs for thalesgroup

CVE-2024-5264 thalesgroup vulnerability CVSS: 0 23 May 2024, 09:15 UTC

Network Transfer with AES KHT in Thales Luna EFT 2.1 and above allows a user with administrative console access to access backups taken via offline analysis

CVE-2023-2737 thalesgroup vulnerability CVSS: 0 16 Aug 2023, 16:15 UTC

Improper log permissions in SafeNet Authentication Service Version 3.4.0 on Windows allows an authenticated attacker to cause a denial of service via local privilege escalation.

CVE-2021-42056 thalesgroup vulnerability CVSS: 7.2 24 Jun 2022, 17:15 UTC

Thales Safenet Authentication Client (SAC) for Linux and Windows through 10.7.7 creates insecure temporary hid and lock files allowing a local attacker, through a symlink attack, to overwrite arbitrary files, and potentially achieve arbitrary command execution with high privileges.

CVE-2021-42811 thalesgroup vulnerability CVSS: 4.0 10 Jun 2022, 11:15 UTC

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in SafeNet KeySecure allows an authenticated user to read arbitrary files from the underlying system on which the product is deployed.

CVE-2021-42809 thalesgroup vulnerability CVSS: 6.9 20 Dec 2021, 21:15 UTC

Improper Access Control of Dynamically-Managed Code Resources (DLL) in Thales Sentinel Protection Installer could allow the execution of arbitrary code.

CVE-2021-42808 thalesgroup vulnerability CVSS: 7.2 20 Dec 2021, 21:15 UTC

Improper Access Control in Thales Sentinel Protection Installer could allow a local user to escalate privileges.

CVE-2021-42138 thalesgroup vulnerability CVSS: 3.5 20 Dec 2021, 21:15 UTC

A user of a machine protected by SafeNet Agent for Windows Logon may leverage weak entropy to access the encrypted credentials of any or all the users on that machine.

CVE-2021-32928 thalesgroup vulnerability CVSS: 7.5 16 Jun 2021, 13:15 UTC

The Sentinel LDK Run-Time Environment installer (Versions 7.6 and prior) adds a firewall rule named “Sentinel License Manager” that allows incoming connections from private networks using TCP Port 1947. While uninstalling, the uninstaller fails to close Port 1947.

CVE-2021-28979 thalesgroup vulnerability CVSS: 4.3 16 Jun 2021, 12:15 UTC

SafeNet KeySecure Management Console 8.12.0 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked.

CVE-2020-15858 thalesgroup vulnerability CVSS: 3.6 21 Aug 2020, 21:15 UTC

Some devices of Thales DIS (formerly Gemalto, formerly Cinterion) allow Directory Traversal by physically proximate attackers. The directory path access check of the internal flash file system can be circumvented. This flash file system can store application-specific data and data needed for customer Java applications, TLS and OTAP (Java over-the-air-provisioning) functionality. The affected products and releases are: BGS5 up to and including SW RN 02.000 / ARN 01.001.06 EHSx and PDSx up to and including SW RN 04.003 / ARN 01.000.04 ELS61 up to and including SW RN 02.002 / ARN 01.000.04 ELS81 up to and including SW RN 05.002 / ARN 01.000.04 PLS62 up to and including SW RN 02.000 / ARN 01.000.04

CVE-2019-15809 thalesgroup vulnerability CVSS: 1.2 03 Oct 2019, 14:15 UTC

Smart cards from the Athena SCS manufacturer, based on the Atmel Toolbox 00.03.11.05 and the AT90SC chip, contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because the Atmel Toolbox 00.03.11.05 contains two versions of ECDSA signature functions, described as fast and secure, but the affected cards chose to use the fast version, which leaks the bit length of the random nonce via timing. This affects Athena IDProtect 010b.0352.0005, Athena IDProtect 010e.1245.0002, Athena IDProtect 0106.0130.0401, Athena IDProtect 010e.1245.0002, Valid S/A IDflex V 010b.0352.0005, SafeNet eToken 4300 010e.1245.0002, TecSec Armored Card 010e.0264.0001, and TecSec Armored Card 108.0264.0001.