Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-8918

Опубликовано: 11 авг. 2020
Источник: nvd
CVSS3: 6.3
CVSS3: 7.1
CVSS2: 3.6
EPSS Низкий

Описание

An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:google:go-tpm:*:*:*:*:*:*:*:*
Версия до 0.3.0 (исключая)

EPSS

Процентиль: 3%
0.00017
Низкий

6.3 Medium

CVSS3

7.1 High

CVSS3

3.6 Low

CVSS2

Дефекты

CWE-665
CWE-665

Связанные уязвимости

CVSS3: 7.1
github
почти 4 года назад

TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm

EPSS

Процентиль: 3%
0.00017
Низкий

6.3 Medium

CVSS3

7.1 High

CVSS3

3.6 Low

CVSS2

Дефекты

CWE-665
CWE-665