Логотип exploitDog
bind:CVE-2020-8918
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-8918

Количество 2

Количество 2

nvd логотип

CVE-2020-8918

больше 5 лет назад

An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-5x29-3hr9-6wpw

почти 4 года назад

TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-8918

An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.

CVSS3: 6.3
0%
Низкий
больше 5 лет назад
github логотип
GHSA-5x29-3hr9-6wpw

TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm

CVSS3: 7.1
0%
Низкий
почти 4 года назад

Уязвимостей на страницу