Описание
The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.
Ссылки
- MitigationThird Party Advisory
- Third Party AdvisoryVDB Entry
- Issue TrackingThird Party Advisory
- Issue TrackingMitigationThird Party Advisory
- Issue TrackingThird Party Advisory
- MitigationThird Party Advisory
- MitigationThird Party Advisory
- Issue TrackingMitigationThird Party Advisory
- MitigationThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Issue TrackingMitigationPatchThird Party Advisory
- MitigationVendor Advisory
Уязвимые конфигурации
Одновременно
Одно из
Одно из
EPSS
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.
Уязвимость библиотеки шифрования Infineon RSA Library, связанная с ошибками при генерации простых чисел в алгоритме RSA, позволяющая нарушителю раскрыть секретную часть ключа
Microsoft Guidance for cleaning up orphaned keys generated on vulnerable TPMs and used for Windows Hello for Business
EPSS
5.9 Medium
CVSS3
4.3 Medium
CVSS2