First published: Tue Jan 17 2023(Updated: )
Use of a Broken or Risky Cryptographic Algorithm in the function mbedtls_mpi_exp_mod() in lignum.c in Mbed TLS Mbed TLS all versions before 3.0.0, 2.27.0 or 2.16.11 allows attackers with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) to recover the private keys used in RSA.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.16.11 | |
ARM mbed TLS | >=2.17.0<2.27.0 | |
ARM mbed TLS | >=2.28.0<3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2021-36647.
The severity of CVE-2021-36647 is medium with a CVSS score of 4.7.
CVE-2021-36647 affects all versions of ARM mbed TLS before 3.0.0, 2.27.0, or 2.16.11.
The CWE ID for CVE-2021-36647 is 327.
Attackers with access to precise enough timing and memory access information can exploit CVE-2021-36647.