First published: Tue Dec 21 2021(Updated: )
In Mbed TLS before 2.28.0 and 3.x before 3.1.0, psa_cipher_generate_iv and psa_cipher_encrypt allow policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | >=2.22.0<2.28.0 | |
ARM mbed TLS | =3.0.0 | |
ARM mbed TLS | =3.1.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45450 is a vulnerability in Mbed TLS before 2.28.0 and 3.x before 3.1.0 that allows policy bypass or oracle-based decryption.
The severity of CVE-2021-45450 is high, with a CVSS score of 7.5.
CVE-2021-45450 affects ARM mbed TLS versions before 2.28.0 and 3.x before 3.1.0.
CVE-2021-45450 can be exploited by an untrusted application gaining access to memory locations containing the output buffer of the psa_cipher_generate_iv and psa_cipher_encrypt functions.
To fix CVE-2021-45450, update Mbed TLS to version 2.28.0 or later for the 2.x branch or version 3.1.0 or later for the 3.x branch.