First published: Tue Oct 27 2020(Updated: )
An issue was discovered in beta versions of the 1Password command-line tool prior to 0.5.5 and in beta versions of the 1Password SCIM bridge prior to 0.7.3. An insecure random number generator was used to generate various keys. An attacker with access to the user's encrypted data may be able to perform brute-force calculations of encryption keys and thus succeed at decryption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
1Password | <0.5.5 | |
1Password | <0.7.3 | |
1Password | <0.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10256 has been classified as a medium severity vulnerability due to its potential impact on the security of encrypted data.
To fix CVE-2020-10256, update the 1Password command-line tool to version 0.5.5 or later and the SCIM bridge to version 0.7.3 or later.
CVE-2020-10256 is caused by the use of an insecure random number generator in certain versions of 1Password products.
Users of beta versions of the 1Password command-line tool prior to 0.5.5 and the SCIM bridge prior to 0.7.3 are affected by CVE-2020-10256.
An attacker cannot exploit CVE-2020-10256 remotely, but they need access to the user's encrypted data to take advantage of the vulnerability.