First published: Thu Jan 23 2020(Updated: )
The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arm Mbed Crypto | <3.0.0 | |
ARM mbed TLS | <2.7.13 | |
ARM mbed TLS | >=2.8.0<2.16.4 | |
ARM mbed TLS | >=2.17.0<2.20.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18222 is a vulnerability in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 that allows a local attacker to recover the private key via side-channel attacks.
The severity of CVE-2019-18222 is medium with a CVSS score of 4.7.
CVE-2019-18222 affects Arm Mbed Crypto versions up to but excluding 3.0.0.
CVE-2019-18222 affects ARM mbed TLS versions up to and including 2.7.13, and versions between 2.8.0 and 2.16.4, and versions between 2.17.0 and 2.20.0.
To fix CVE-2019-18222, update to Arm Mbed Crypto 3.0.0 or later, or update to a version of ARM mbed TLS that is higher than 2.20.0 or lower than 2.7.13, 2.17.0, or 2.16.4.