First published: Tue Jan 19 2021(Updated: )
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ietf Public Key Cryptography Standards \#1 | =1.5 | |
Microchip Microchip Libraries For Applications | <=2018-11-26 | |
Apple macOS | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-20950 is a vulnerability that allows an attacker to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext.
CVE-2020-20950 has a severity rating of medium, with a severity value of 5.9.
CVE-2020-20950 affects Microchip Libraries for Applications up to version 2018-11-26 and the Ietf Public Key Cryptography Standards #1 version 1.5.
CVE-2020-20950 can be exploited by making successive queries to the server using the vulnerable library, allowing for the decryption of encrypted ciphertext.
No, Apple macOS, Linux kernel, and Microsoft Windows are not vulnerable to CVE-2020-20950.