First published: Wed Sep 02 2020(Updated: )
A Lucky 13 timing side channel in mbedtls_ssl_decrypt_buf in library/ssl_msg.c in Trusted Firmware Mbed TLS through 2.23.0 allows an attacker to recover secret key information. This affects CBC mode because of a computed time difference based on a padding length.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.7.17 | |
ARM mbed TLS | >=2.8.0<2.16.8 | |
ARM mbed TLS | >=2.17.0<2.24.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16150 is a Lucky 13 timing side channel vulnerability in mbedtls_ssl_decrypt_buf in Trusted Firmware Mbed TLS through 2.23.0.
CVE-2020-16150 affects the ARM mbed TLS library versions up to 2.7.17, between 2.8.0 and 2.16.8, and between 2.17.0 and 2.24.0.
CVE-2020-16150 has a severity of 5.5 (medium).
An attacker can exploit CVE-2020-16150 to recover secret key information through a Lucky 13 timing side channel in CBC mode.
To mitigate CVE-2020-16150, update to a version of the ARM mbed TLS library above 2.24.0 or apply the necessary patches provided by the vendor.