First published: Wed Jan 20 2021(Updated: )
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
St Stm32cubef0 | ||
St Stm32cubef1 | ||
St Stm32cubef2 | ||
St Stm32cubef3 | ||
St Stm32cubef4 | ||
St Stm32cubef7 | ||
St Stm32cubeg0 | ||
St Stm32cubeg4 | ||
St Stm32cubeh7 | ||
St Stm32cubeide | ||
St Stm32cubel0 | ||
St Stm32cubel1 | ||
St Stm32cubel4 | ||
St Stm32cubel4\+ | ||
St Stm32cubel5 | ||
St Stm32cubemonitor | ||
St Stm32cubemp1 | ||
St Stm32cubemx | ||
St Stm32cubeprogrammer | ||
St Stm32cubewb | ||
St Stm32cubewl | ||
Ietf Public Key Cryptography Standards \#1 | =1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-20949 is a vulnerability known as Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924).
Bleichenbacher's attack allows an attacker to decrypt an encrypted ciphertext by making successive queries using Bleichenbacher's oracle attack.
The severity of CVE-2020-20949 is medium with a severity value of 5.9.
The vulnerability affects STM32Cube firmware library software expansions for various STM32 devices, including Stm32cubef0, Stm32cubef1, Stm32cubef2, Stm32cubef3, Stm32cubef4, Stm32cubef7, Stm32cubeg0, Stm32cubeg4, Stm32cubeh7, Stm32cubeide, Stm32cubel0, Stm32cubel1, Stm32cubel4, Stm32cubel4+, Stm32cubel5, Stm32cubemonitor, Stm32cubemp1, Stm32cubemx, Stm32cubeprogrammer, Stm32cubewb, Stm32cubewl.
To fix CVE-2020-20949, users are advised to update the STM32Cube firmware library software expansion to the latest version provided by STMicroelectronics.