First published: Wed Jul 14 2021(Updated: )
In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.26.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24119 is a side-channel vulnerability in base64 PEM file decoding in Trusted Firmware Mbed TLS 2.24.0.
Users of ARM mbed TLS 2.24.0 up to 2.26.0 and Fedora 33, Fedora 34, Debian Linux 9.0, and Debian Linux 10.0 are affected.
An attacker with system-level access can use controlled-channel and side-channel attacks to obtain information about secret RSA keys.
CVE-2021-24119 has a severity rating of 4.9 (medium).
You can find more information about CVE-2021-24119 at the following references: [Link1], [Link2], [Link3].