First published: Thu Nov 14 2019(Updated: )
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
St St33tphf2espi Firmware | =71.0 | |
St St33tphf2espi Firmware | =71.4 | |
St St33tphf2espi Firmware | =71.12 | |
St St33tphf2espi Firmware | =73.0 | |
St St33tphf2espi Firmware | =73.4 | |
St St33tphf2espi Firmware | =73.8 | |
St St33tphf2espi | ||
St St33tphf2ei2c Firmware | =73.5 | |
St St33tphf2ei2c Firmware | =73.9 | |
St St33tphf2ei2c | ||
St St33tphf20spi Firmware | =74.0 | |
St St33tphf20spi Firmware | =74.4 | |
St St33tphf20spi Firmware | =74.8 | |
St St33tphf20spi Firmware | =74.16 | |
St St33tphf20spi | ||
St St33tphf20i2c Firmware | =74.5 | |
St St33tphf20i2c Firmware | =74.9 | |
St St33tphf20i2c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16863 is a vulnerability that affects STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12, allowing attackers to extract the ECDSA private key via a side-channel timing attack.
Attackers can exploit CVE-2019-16863 by performing a side-channel timing attack to extract the ECDSA private key from vulnerable STMicroelectronics ST33TPHF2ESPI TPM devices.
CVE-2019-16863 has a severity score of 5.9, which is considered medium.
CVE-2019-16863 affects STMicroelectronics ST33TPHF2ESPI Firmware versions 71.0, 71.4, 71.12, 73.0, 73.4, and 73.8.
You can find more information about CVE-2019-16863 at the following references: http://tpm.fail, https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024, https://support.f5.com/csp/article/K32412503?utm_source=f5support&utm_medium=RSS