Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-15361

Опубликовано: 16 окт. 2017
Источник: nvd
CVSS3: 5.9
CVSS2: 4.3
EPSS Высокий

Описание

The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:infineon:trusted_platform_firmware:4.31:*:*:*:*:*:*:*
cpe:2.3:o:infineon:trusted_platform_firmware:4.32:*:*:*:*:*:*:*
cpe:2.3:o:infineon:trusted_platform_firmware:6.40:*:*:*:*:*:*:*
cpe:2.3:o:infineon:trusted_platform_firmware:133.32:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:acer:c720_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebase:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebase_24:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_11_c730:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_11_c730e:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_11_c735:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_11_c740:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_11_c771:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_11_c771t:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_11_n7_c731:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_13_cb5-311:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_14_cb3-431:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_14_for_work_cp5-471:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_15_cb3-531:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_15_cb3-532:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_15_cb5-571:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_r11:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebook_r13_cb5-312t:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebox:-:*:*:*:*:*:*:*
cpe:2.3:h:acer:chromebox_cxi2:-:*:*:*:*:*:*:*
cpe:2.3:h:aopen:chromebase:-:*:commercial:*:*:*:*:*
cpe:2.3:h:aopen:chromebase:-:*:mini:*:*:*:*:*
cpe:2.3:h:aopen:chromebox:-:*:commercial:*:*:*:*:*
cpe:2.3:h:aopen:chromeboxi:-:*:mini:*:*:*:*:*
cpe:2.3:h:asi:chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebit_cs10:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebook_c200:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebook_c201pa:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebook_c202sa:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebook_c300:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebook_c300sa:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebook_c301sa:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebook_flip_c100pa:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebook_flip_c302:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebox_cn60:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:chromebox_cn62:-:*:*:*:*:*:*:*
cpe:2.3:h:bobicus:chromebook_11:*:*:*:*:*:*:*:*
cpe:2.3:h:ctl:j2_chromebook:-:*:*:*:*:education:*:*
cpe:2.3:h:ctl:j4_chromebook:-:*:*:*:*:education:*:*
cpe:2.3:h:ctl:j5_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:ctl:n6_chromebook:-:*:*:*:*:education:*:*
cpe:2.3:h:ctl:nl61_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:dell:chromebook_11:-:*:*:*:*:*:*:*
cpe:2.3:h:dell:chromebook_11_3120:-:*:*:*:*:*:*:*
cpe:2.3:h:dell:chromebook_11_3189:-:*:*:*:*:*:*:*
cpe:2.3:h:dell:chromebook_11_model_3180:-:*:*:*:*:*:*:*
cpe:2.3:h:dell:chromebook_13_3380:-:*:*:*:*:*:*:*
cpe:2.3:h:dell:chromebox:-:*:*:*:*:*:*:*
cpe:2.3:h:edugear:chromebook_k:-:*:*:*:*:*:*:*
cpe:2.3:h:edugear:chromebook_m:-:*:*:*:*:*:*:*
cpe:2.3:h:edugear:chromebook_r:-:*:*:*:*:*:*:*
cpe:2.3:h:edugear:cmt_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:edxis:chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:edxis:education_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:epik:chromebook_elb1101:-:*:*:*:*:*:*:*
cpe:2.3:h:google:pixel:-:*:*:*:*:*:*:*
cpe:2.3:h:haier:chromebook_11:-:*:*:*:*:*:*:*
cpe:2.3:h:haier:chromebook_11_c:-:*:*:*:*:*:*:*
cpe:2.3:h:haier:chromebook_11_g2:-:*:*:*:*:*:*:*
cpe:2.3:h:haier:chromebook_11e:-:*:*:*:*:*:*:*
cpe:2.3:h:hexa:chromebook_pi:-:*:*:*:*:*:*:*
cpe:2.3:h:hisense:chromebook_11:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook:-:*:*:*:*:meetings:*:*
cpe:2.3:h:hp:chromebook_11-vxxx:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_1100-1199:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_2000-2099:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_2100-2199:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_2200-2299:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_g1:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_g2:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_g3:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_g4\/g4_ee:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_g5:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_11_g5_ee:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_13_g1:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_14:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_14_ak000-099:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_14_g3:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_14_g4:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebook_14_x000-x999:-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebox_cb1-\(000-099\):-:*:*:*:*:*:*:*
cpe:2.3:h:hp:chromebox_g1:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:100s_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:n20_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:n21_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:n22_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:n23_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:n23_flex_11_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:n23_yoga_11_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:n42_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:thinkcentre_chromebox:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:thinkpad_11e_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lenovo:thinkpad_13_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:lg:chromebase_22cb25s:-:*:*:*:*:*:*:*
cpe:2.3:h:lg:chromebase_22cv241:-:*:*:*:*:*:*:*
cpe:2.3:h:medion:akoya_s2013:-:*:*:*:*:*:*:*
cpe:2.3:h:medion:chromebook_s2015:-:*:*:*:*:*:*:*
cpe:2.3:h:mercer:chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:mercer:v2_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:ncomputing:chromebook_cx100:-:*:*:*:*:*:*:*
cpe:2.3:h:nexian:chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:pcmerge:chromebook_pcm-116t-432b:-:*:*:*:*:*:*:*
cpe:2.3:h:poin2:chromebook_11:-:*:*:*:*:*:*:*
cpe:2.3:h:poin2:chromebook_14:-:*:*:*:*:*:*:*
cpe:2.3:h:positivo:chromebook_ch1190:-:*:*:*:*:*:*:*
cpe:2.3:h:prowise:entry_line_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:prowise:proline_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:rgs:education_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:samsung:chromebook_2_11:-:*:*:*:*:*:*:*
cpe:2.3:h:samsung:chromebook_2_11_xe500c12:-:*:*:*:*:*:*:*
cpe:2.3:h:samsung:chromebook_2_13:-:*:*:*:*:*:*:*
cpe:2.3:h:samsung:chromebook_3:-:*:*:*:*:*:*:*
cpe:2.3:h:samsung:chromebook_plus:-:*:*:*:*:*:*:*
cpe:2.3:h:samsung:chromebook_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:sector-five:e1_rugged_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:senkatel:c1101_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:toshiba:chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:toshiba:chromebook_2:-:*:*:*:*:*:*:*
cpe:2.3:h:toshiba:chromebook_2:-:*:2015:*:*:*:*:*
cpe:2.3:h:true:idc_chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:true:idc_chromebook_11:-:*:*:*:*:*:*:*
cpe:2.3:h:videonet:chromebook:-:*:*:*:*:*:*:*
cpe:2.3:h:videonet:chromebook_bl10:-:*:*:*:*:*:*:*
cpe:2.3:h:viglen:chromebook_11:-:*:*:*:*:*:*:*
cpe:2.3:h:viglen:chromebook_360:-:*:*:*:*:*:*:*
cpe:2.3:h:xolo:chromebook:-:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:infineon:rsa_library:*:*:*:*:*:*:*:*
Версия до 1.02.013 (включая)

EPSS

Процентиль: 99%
0.73437
Высокий

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 5.9
github
больше 3 лет назад

The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.

CVSS3: 5.9
fstec
больше 8 лет назад

Уязвимость библиотеки шифрования Infineon RSA Library, связанная с ошибками при генерации простых чисел в алгоритме RSA, позволяющая нарушителю раскрыть секретную часть ключа

msrc
около 6 лет назад

Microsoft Guidance for cleaning up orphaned keys generated on vulnerable TPMs and used for Windows Hello for Business

msrc
больше 8 лет назад

Vulnerability in TPM could allow Security Feature Bypass

EPSS

Процентиль: 99%
0.73437
Высокий

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

NVD-CWE-noinfo