Error “Could not open default key rings” on Encryption Desktop 10.3.2 MP10

I need a solution

Currently, we have a license only for PGP Zip in Encryption Desktop 10.3.2 MP10. We have properly installed the application on Windows 10 enterprise. We have properly imported out Private Key and status of the key is verified with Trust being “Implicit”.

Whenever we try to right-click a PGP file and try the option of “Decrypt & Verify” the error pops up stating “Could not open default key rings. Another application might have opened them”. We tried below steps 

  1. Verified that no other application has opened the keyring file
  2. Verified that the folder where keyring files have been placed is accessible
  3. Have tried changing the default location from My Documents to Desktop as well as Shared Folder from where the Private key was imported, nothing worked. We got the same error. (The keyring files were copied respectfully in those folders which made the key as Verified)
  4. We are able to successfully open the PGP file using the “Edit” option which opens the file PGP Zip and then can be extracted in a separate folder. This is working fine. But we want to decrypt many files at the same time in the same location which will be possible only through the “Decrypt & Verify” option
  5. Even before starting of Encryption Desktop or any other PGP services when we try this “Decrypt & Verify” option it is giving above error. But if we try the “Edit” option it is asking “Would you like to start all PGP services now?”

Could someone please shed some light on our issue, this issue has caused the delay in our project way too long.

Thanks

0

Related:

  • No Related Posts

Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1612)

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device.

The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1612

This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

This bundle contains several similar CLI command injection vulnerabilities; they differ primarily in which products and software versions are affected. See Details for more information.

Security Impact Rating: High

CVE: CVE-2019-1612

Related:

  • No Related Posts

Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Shell Escape Vulnerability

A vulnerability in a specific CLI command implementation of Cisco Nexus 9000 Series ACI Mode Switch Software could allow an authenticated, local attacker to escape a restricted shell on an affected device.

The vulnerability is due to insufficient sanitization of user-supplied input when issuing a specific CLI command with parameters on an affected device. An attacker could exploit this vulnerability by authenticating to the device CLI and issuing certain commands. A successful exploit could allow the attacker to escape the restricted shell and execute arbitrary commands with root-level privileges on the affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-shell-escape

This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Security Impact Rating: High

CVE: CVE-2019-1591

Related:

  • No Related Posts

Cisco NX-OS Software Image Signature Verification Vulnerability

A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device.

The vulnerability is due to improper verification of digital signatures for software images. An attacker could exploit this vulnerability by loading an unsigned software image on an affected device. A successful exploit could allow the attacker to boot a malicious software image.

Note: The fix for this vulnerability requires a BIOS upgrade as part of the software upgrade. For additional information, see the Details section of this advisory.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif

This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Security Impact Rating: High

CVE: CVE-2019-1615

Related:

  • No Related Posts

Cisco NX-OS Software Privilege Escalation Vulnerability

A vulnerability in the user account management interface of Cisco NX-OS Software could allow an authenticated, local attacker to gain elevated privileges on an affected device.

The vulnerability is due to an incorrect authorization check of user accounts and their associated Group ID (GID). An attacker could exploit this vulnerability by taking advantage of a logic error that will permit the use of higher privileged commands than what is necessarily assigned. A successful exploit could allow an attacker to execute commands with elevated privileges on the underlying Linux shell of an affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca

This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Security Impact Rating: High

CVE: CVE-2019-1604

Related:

  • No Related Posts

Cisco Nexus 9000 Series Switches Standalone NX-OS Mode Fibre Channel over Ethernet NPV Denial of Service Vulnerability

A vulnerability in the Fibre Channel over Ethernet (FCoE) N-port Virtualization (NPV) protocol implementation in Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.

The vulnerability is due to an incorrect processing of FCoE packets when the fcoe-npv feature is uninstalled. An attacker could exploit this vulnerability by sending a stream of FCoE frames from an adjacent host to an affected device. An exploit could allow the attacker to cause packet amplification to occur, resulting in the saturation of interfaces and a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-npv-dos

This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Security Impact Rating: High

CVE: CVE-2019-1617

Related:

  • No Related Posts

Cisco NX-OS Software Netstack Denial of Service Vulnerability

A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device.

The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition.

Note: This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-netstack

This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Security Impact Rating: High

CVE: CVE-2019-1599

Related:

  • No Related Posts

Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability

A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to gain read and write access to a critical configuration file.

The vulnerability is due to a failure to impose strict filesystem permissions on the targeted device. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow an attacker to use the content of this configuration file to bypass authentication and log in as any user of the device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-file-access

This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Security Impact Rating: High

CVE: CVE-2019-1601

Related:

  • No Related Posts

Gemalto Expands Cloud HSM On Demand Solutions

SafeNet Data Protection On Demand cloud platform now offers HSM On

Demand to secure CyberArk Privileged Access Management, Oracle

Transparent Data Encryption, and Hyperledger Blockchain Transactions

AMSTERDAM–(BUSINESS WIRE)–Gemalto, the world leader in digital security, today announced the

availability of three new cloud-based Hardware Security Module (HSM)

services, HSM

On Demand for CyberArk
, HSM

On Demand for Hyperledger
and HSM

On Demand for Oracle TDE
. Each service is available through the SafeNet

Data Protection on Demand
platform, a marketplace of cloud-based

HSM, encryption and key management services that easily integrates with

most widely used cloud services and IT products to protect data wherever

it is created, accessed or stored.

The rapid adoption of cloud and digital services has made it difficult

for organizations to secure data and identities that are created, stored

and managed outside the perimeter. While organizations recognize that

data encryption is the optimal solution to secure sensitive information,

they can be challenged by the cost and complexity of deploying

encryption, including Hardware Security Modules to secure their

cryptographic operations. Gemalto’s SafeNet Data Protection On Demand

solves these challenges by providing cloud-based HSM services that and

can be deployed in minutes without the need for highly skilled staff.

Gemalto, a leader in the HSM market, is proven to help customers secure

their encryption keys and data across cloud, hybrid, and on-premises

environments.

“A worsening threat landscape, combined with aggressive cloud adoption

and evolving privacy regulations, have presented complex new challenges

related to encryption, privileged access and financial transactions,”

said Todd Moore, Senior Vice President of Encryption Products at

Gemalto. “Our newest Cloud HSM On Demand services help organizations

stay in front of new threats and regulations, by easily deploying an HSM

solution for the strongest possible key management and security

practices, all while providing fast, easy set-up, with remarkable

savings over traditional approaches involving specialized hardware and

skills.”

“Many organizations would like to deploy data security more broadly, but

are often wary due to concerns about complexity, cost and staffing

requirements, particularly with respect to encryption and key

management,” said Garrett Bekker, Principal Analyst at 451 Research.

“The release of SafeNet Data Protection On Demand was a positive step

towards addressing those concerns, and extending its cloud HSM

capability to newer use cases like blockchain, database security and

privileged credentials is a logical and timely move.”

HSM On Demand for CyberArk

HSM

On Demand for CyberArk
works seamlessly with CyberArk’s Privileged

Access Security Solution, providing private key protection and strong

entropy for key generation for system keys.. By securing the master key

and ensuring that it is hosted in a secure vault, HSM On Demand for

CyberArk mitigates the risk of the master key being exposed or

compromised.

HSM On Demand for Hyperledger

HSM

On Demand for Hyperledger
provides trust for blockchain transactions

by securing the cryptographic keys that sign them. It protects digital

wallets, while ensuring keys are readily available in the cloud once

access is granted. The service provides high assurance security in data

centers and the cloud, enabling multi-tenancy of blockchain identities

per partition as proof of transaction and for auditing requirements. It

also delivers performance improvements resulting from off-loading

cryptographic operations from application servers to the HSM on Demand

service.

HSM On Demand for Oracle TDE

HSM

for Oracle TDE
(Transparent Data Encryption) solves the challenge

presented by locally stored encryption keys by protecting them with a

master key, stored in a separate service key vault. This ensures that

only authorized services are allowed to request the local key to be

decrypted. If an attacker steals the database, it is encrypted and

inaccessible, since the attacker does not have access to the keys that

are securely stored on the HSM.

Additional Resources

About Gemalto

Gemalto (Euronext NL0000400653 GTO) is the global leader in digital

security
, with 2018 annual revenues of €3 billion and customers in

over 180 countries. We bring trust to an increasingly connected world.

From secure software to biometrics and encryption, our technologies and

services enable businesses and governments to authenticate identities

and protect data so they stay safe and enable services in personal

devices, connected objects, the cloud and in between.

Gemalto’s solutions are at the heart of modern life, from payment to

enterprise security and the internet of things. We authenticate people,

transactions and objects, encrypt data and create value for software –

enabling our clients to deliver secure digital services for billions of

individuals and things.

Our 15,000 employees operate out of 110 offices, 47 personalization and

data centers, and 35 research and software development centers located

in 47 countries.

For more information visit www.gemalto.com,

or follow @gemalto

on Twitter.

Contacts

Gemalto media contacts:

Tauri Cox

North America

+1

512 257 3916

tauri.cox@gemalto.com

Sophie Dombres

Europe Middle East & Africa

+33 4 42 36 57

38

sophie.dombres@gemalto.com

Jaslin Huang

Asia Pacific

+65 6317 3005

jaslin.huang@gemalto.com

Alexis Camarillo

Latin America

+52 5521223627

alexis.camarillo@gemalto.com

DutchNews.nl has been free for 12 years, but now we are asking our readers to help. Your donation will enable us to keep providing you with fair and accurate news and features about all things Dutch.

Donate via Ideal, credit card or Paypal.

Related:

  • No Related Posts