First published: Wed Apr 15 2020(Updated: )
An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. An attacker that can get precise enough side-channel measurements can recover the long-term ECDSA private key by (1) reconstructing the projective coordinate of the result of scalar multiplication by exploiting side channels in the conversion to affine coordinates; (2) using an attack described by Naccache, Smart, and Stern in 2003 to recover a few bits of the ephemeral scalar from those projective coordinates via several measurements; and (3) using a lattice attack to get from there to the long-term ECDSA private key used for the signatures. Typically an attacker would have sufficient access when attacking an SGX enclave and controlling the untrusted OS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | >=2.7.0<2.7.15 | |
ARM mbed TLS | >=2.16.0<2.16.6 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-10932.
The severity of CVE-2020-10932 is medium with a CVSS score of 4.7.
The ARM Mbed TLS versions 2.7.0 to 2.7.15 and 2.16.0 to 2.16.6 are affected by CVE-2020-10932.
An attacker can exploit CVE-2020-10932 by getting precise enough side-channel measurements to recover the long-term ECDSA private key by exploiting side channels.
Yes, patches and updates are available for the affected versions of ARM Mbed TLS. Please refer to the vendor's website for the appropriate patch or update.