Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-13092

Опубликовано: 13 июл. 2018
Источник: nvd
CVSS3: 7.8
CVSS2: 4.6
EPSS Низкий

Описание

The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including improperly specified HDL syntax allows use of an EDA tool as a decryption oracle. The methods are flawed and, in the most egregious cases, enable attack vectors that allow recovery of the entire underlying plaintext IP. Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key, among other impacts.

Комментарий

According to https://www.kb.cert.org/vuls/id/739007: The P1735 IEEE standard describes methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP. The methods are flawed and, in the most egregious cases, enable attack vectors that allow recovery of the entire underlying plaintext IP. Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key, among other impacts.

Commercial electronic design automation (EDA) tools that utilize the P1735 standard, or products designed with such EDA tools may be vulnerable.
The CPE configuration provided is likely not inclusive of all vulnerable products. Please contact the vendor of your product for more information.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:-:-:-:*:*:*:*:*:*:*

EPSS

Процентиль: 27%
0.00096
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-310
CWE-310

Связанные уязвимости

CVSS3: 7.8
github
больше 3 лет назад

The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including improperly specified HDL syntax allows use of an EDA tool as a decryption oracle. The methods are flawed and, in the most egregious cases, enable attack vectors that allow recovery of the entire underlying plaintext IP. Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key, among other impacts.

EPSS

Процентиль: 27%
0.00096
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-310
CWE-310