Описание
The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 & Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface.
Ссылки
- Third Party Advisory
- PatchThird Party Advisory
- Product
- Product
- Third Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Product
- Product
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:solokeys:solo_firmware:4.0.0:*:*:*:*:*:*:*
cpe:2.3:h:solokeys:solo:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:solokeys:somu_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:solokeys:somu:-:*:*:*:*:*:*:*
Конфигурация 3
Одновременно
cpe:2.3:o:nitrokey:fido2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nitrokey:fido2:-:*:*:*:*:*:*:*
EPSS
Процентиль: 10%
0.00036
Низкий
6.8 Medium
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-326
Связанные уязвимости
github
больше 3 лет назад
The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 & Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface.
EPSS
Процентиль: 10%
0.00036
Низкий
6.8 Medium
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-326