First published: Thu Sep 26 2019(Updated: )
Arm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, use an RNG with insufficient entropy for blinding, which might allow an attacker to recover a private key via side-channel attacks if a victim signs the same message many times. (For Mbed TLS, the fix is also available in versions 2.7.12 and 2.16.3.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arm Mbed Crypto | <2.0.0 | |
ARM mbed TLS | <2.7.12 | |
ARM mbed TLS | >=2.8.0<2.16.3 | |
ARM mbed TLS | >=2.17.0<2.19.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16910 is a vulnerability in Arm Mbed TLS and Arm Mbed Crypto that allows an attacker to recover a private key via side-channel attacks.
CVE-2019-16910 has a severity score of 5.3 (medium).
Arm Mbed Crypto versions up to 2.0.0 and Arm Mbed TLS versions up to 2.7.12, 2.8.0 to 2.16.3, and 2.17.0 to 2.19.0 are affected.
CVE-2019-16910 occurs when deterministic ECDSA is enabled and an RNG with insufficient entropy is used for blinding, allowing an attacker to recover a private key via side-channel attacks.
To fix CVE-2019-16910, update Arm Mbed TLS to version 2.19.0 or later and Arm Mbed Crypto to version 2.0.0 or later.