Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-16863

Опубликовано: 08 янв. 2020
Источник: redhat
CVSS3: 6.8

Описание

STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.

Cryptographic timing vulnerabilities were discovered in certain versions of the Trusted Platform Module (TPM) firmware distributed by Intel and STMicroelectronics. Software that uses the TPM to compute ECDSA signatures could leak information through the timing of ECDSA signature operations, allowing an attacker to recover parts of the private key.

Отчет

This is a vulnerability in TPM firmware distributed by hardware vendors, not by Red Hat. Red Hat Enterprise Linux exposes the TPM device at /dev/tpm* where it is available for software with the correct privileges to use. Customers are advised to always ensure that firmware updates from hardware vendors are kept up to date with security fixes.

Меры по смягчению последствий

To remediate this vulnerability, install relevant firmware updates from your hardware vendor and follow their advice to regenerate keys that may be vulnerable or compromised. STMicroelectronics, Intel and OEMs have published firmware updates and advice at the links provided in the External References section.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6linux-firmwareNot affected
Red Hat Enterprise Linux 7linux-firmwareNot affected
Red Hat Enterprise Linux 8linux-firmwareNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=1788755hw: ECDSA signature timing vulnerabilities in TPM module

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
около 6 лет назад

STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.

CVSS3: 5.9
github
больше 3 лет назад

STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.

CVSS3: 5.9
fstec
около 6 лет назад

Уязвимость реализации алгоритма ECDSA микропрограммного обеспечения TPM-процессоров STMicroelectronics ST33, позволяющая нарушителю восстановить значение закрытых ключей, хранимых в модуле TPM (Trusted Platform Module)

msrc
около 6 лет назад

Microsoft Guidance for Vulnerability in Trusted Platform Module (TPM)

6.8 Medium

CVSS3