First published: Mon Aug 23 2021(Updated: )
An issue was discovered in Mbed TLS before 2.24.0 (and before 2.16.8 LTS and before 2.7.17 LTS). There is missing zeroization of plaintext buffers in mbedtls_ssl_read to erase unused application data from memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.7.17 | |
ARM mbed TLS | >=2.8.0<2.16.8 | |
ARM mbed TLS | >=2.17.0<2.24.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36476 is a vulnerability in Mbed TLS before versions 2.24.0, 2.16.8 LTS, and 2.7.17 LTS that allows attackers to access sensitive data in memory.
The CVE-2020-36476 vulnerability can be exploited by an attacker to read sensitive information from memory by taking advantage of missing zeroization of plaintext buffers in the mbedtls_ssl_read function.
CVE-2020-36476 has a severity score of 7.5 (high).
The following versions of Mbed TLS and Debian Linux are affected: Mbed TLS versions up to (excluding) 2.7.17, 2.8.0 up to (excluding) 2.16.8, and 2.17.0 up to (excluding) 2.24.0. Debian Linux versions 9.0 and 10.0.
To fix the CVE-2020-36476 vulnerability, update Mbed TLS to version 2.24.0, 2.16.8 LTS, or 2.7.17 LTS, depending on the affected version. Additionally, update Debian Linux to the latest available version.