First published: Fri Jun 26 2020(Updated: )
A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nspr | <0:4.25.0-2.el7_9 | 0:4.25.0-2.el7_9 |
redhat/nss | <0:3.53.1-3.el7_9 | 0:3.53.1-3.el7_9 |
redhat/nss-softokn | <0:3.53.1-6.el7_9 | 0:3.53.1-6.el7_9 |
redhat/nss-util | <0:3.53.1-1.el7_9 | 0:3.53.1-1.el7_9 |
redhat/nss | <0:3.53.1-17.el8_3 | 0:3.53.1-17.el8_3 |
All of | ||
Mozilla Firefox | =80 | |
Google Android | ||
redhat/nss | <3.55 | 3.55 |
Mozilla Firefox | <80 | 80 |
Mozilla Firefox | <80.0 | |
Mozilla Firefox | <80.0 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
This is a side channel attack which can used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-12401 is a vulnerability that allows an attacker to extract partial information about the ECDSA nonce during ECDSA signature generation.
Mozilla Firefox version 80 is affected by CVE-2020-12401.
Google Android is affected by CVE-2020-12401.
CVE-2020-12401 has a severity rating of medium, with a CVSS score of 4.4.
To fix CVE-2020-12401, it is recommended to update to Mozilla Firefox version 80 or apply the appropriate security patches released by the vendor.