First published: Mon Jul 19 2021(Updated: )
An issue was discovered in Arm Mbed TLS before 2.24.0. An attacker can recover a private key (for RSA or static Diffie-Hellman) via a side-channel attack against generation of base blinding/unblinding values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.7.17 | |
ARM mbed TLS | >=2.8.0<2.16.8 | |
ARM mbed TLS | >=2.17.0<2.24.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-36424.
The severity level of CVE-2020-36424 is medium.
Versions up to exclusive 2.7.17, between inclusive exclusive 2.8.0 and 2.16.8, and between inclusive exclusive 2.17.0 and 2.24.0 of Arm Mbed TLS are affected by CVE-2020-36424.
An attacker can exploit CVE-2020-36424 by performing a side-channel attack against the generation of base blinding/unblinding values to recover a private key (for RSA or static Diffie-Hellman).
To fix CVE-2020-36424, it is recommended to update Arm Mbed TLS to version 2.24.0 or later.