First published: Thu Jul 09 2020(Updated: )
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when updating NFC specific components of the OTP configurations. This may allow an attacker to access configured OTPs and passwords stored in slots that were not configured by the user to be read over NFC, despite a user having set an access code. (Users who have not set an access code, or who have not configured the OTP slots, are not impacted by this issue.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yubico Yubikey 5 Nfc Firmware | >=5.0.0<=5.2.6 | |
Yubico Yubikey 5 Nfc Firmware | >=5.3.0<=5.3.1 | |
Yubico YubiKey 5 NFC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this information leak on Yubico YubiKey 5 NFC devices is CVE-2020-15001.
The severity of CVE-2020-15001 is medium with a severity value of 5.3.
Yubico YubiKey 5 NFC firmware versions 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1 are affected by CVE-2020-15001.
The access code in the OTP application of Yubico YubiKey 5 NFC devices is intended to prevent unauthorized changes to OTP configurations.
No, the access code is not checked when making changes to OTP configurations on Yubico YubiKey 5 NFC devices.