First published: Tue Apr 21 2020(Updated: )
A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nspr | <0:4.25.0-2.el7_9 | 0:4.25.0-2.el7_9 |
redhat/nss | <0:3.53.1-3.el7_9 | 0:3.53.1-3.el7_9 |
redhat/nss-softokn | <0:3.53.1-6.el7_9 | 0:3.53.1-6.el7_9 |
redhat/nss-util | <0:3.53.1-1.el7_9 | 0:3.53.1-1.el7_9 |
redhat/nss | <0:3.53.1-17.el8_3 | 0:3.53.1-17.el8_3 |
Mozilla Firefox | <80.0 | |
Mozilla Firefox | <80.0 | |
All of | ||
Mozilla Firefox | =80 | |
Google Android | ||
redhat/nss | <3.55 | 3.55 |
Mozilla Firefox | <80 | 80 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-6829 is a vulnerability found in nss, where it is possible to extract partial information about the ECDSA nonce during EC scalar point multiplication.
Mozilla Firefox (version 80), Google Android, IBM Security Guardium (versions 10.5 to 11.4) are affected by CVE-2020-6829.
CVE-2020-6829 has a severity rating of 5.3 (Medium).
To fix CVE-2020-6829, update to Mozilla Firefox 80, Google Android, or the latest version of IBM Security Guardium.
You can find more information about CVE-2020-6829 in the following references: Mozilla Bugzilla, Mozilla Security Advisories, and Red Hat CVE link.