First published: Mon Jul 19 2021(Updated: )
An issue was discovered in Arm Mbed TLS before 2.23.0. A side channel allows recovery of an ECC private key, related to mbedtls_ecp_check_pub_priv, mbedtls_pk_parse_key, mbedtls_pk_parse_keyfile, mbedtls_ecp_mul, and mbedtls_ecp_mul_restartable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.16.7 | |
ARM mbed TLS | >=2.17.0<2.23.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-36422.
The severity of CVE-2020-36422 is medium with a CVSS score of 5.3.
Arm Mbed TLS versions up to and including 2.16.7 and versions between 2.17.0 and 2.23.0, as well as Debian Linux version 10.0, are affected by CVE-2020-36422.
CVE-2020-36422 is a side channel vulnerability that allows an attacker to recover an ECC private key through various functions in Arm Mbed TLS.
To fix CVE-2020-36422, update to a version of Arm Mbed TLS that is later than 2.23.0 or apply the necessary patches provided by the software vendor.