Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-12402

Опубликовано: 02 июн. 2020
Источник: redhat
CVSS3: 4.4
EPSS Низкий

Описание

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

A flaw was found in NSS, where it is vulnerable to RSA key generation cache timing side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality.

Отчет

A timing attack was found in the way NSS generated RSA keys. A man-in-the-middle attacker could use this attack during RSA key generation to recover the private key. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5nssOut of support scope
Red Hat Enterprise Linux 6nssOut of support scope
Red Hat OpenShift Container Platform 4nss-altfilesNot affected
Red Hat Enterprise Linux 7nsprFixedRHSA-2020:407629.09.2020
Red Hat Enterprise Linux 7nssFixedRHSA-2020:407629.09.2020
Red Hat Enterprise Linux 7nss-softoknFixedRHSA-2020:407629.09.2020
Red Hat Enterprise Linux 7nss-utilFixedRHSA-2020:407629.09.2020
Red Hat Enterprise Linux 8nsprFixedRHSA-2020:328003.08.2020
Red Hat Enterprise Linux 8nssFixedRHSA-2020:328003.08.2020
Red Hat OpenShift Doopenshiftdo/odo-init-image-rhel7FixedRHSA-2021:094922.03.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-327
https://bugzilla.redhat.com/show_bug.cgi?id=1826231nss: Side channel vulnerabilities during RSA key generation

EPSS

Процентиль: 29%
0.00102
Низкий

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.4
ubuntu
больше 5 лет назад

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

CVSS3: 4.4
nvd
больше 5 лет назад

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

CVSS3: 4.4
debian
больше 5 лет назад

During RSA key generation, bignum implementations used a variation of ...

suse-cvrf
больше 5 лет назад

Security update for mozilla-nss

suse-cvrf
больше 5 лет назад

Security update for mozilla-nss

EPSS

Процентиль: 29%
0.00102
Низкий

4.4 Medium

CVSS3