Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-18222 |
CWE-ID | CWE-310 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
mbedtls (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU26020
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-18222
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to sensitive information.
the vulnerability exists due to the ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsmbedtls (Alpine package): 2.16.1-r1 - 2.16.3-r0
mbedtls (Alpine package):
CPE2.3https://git.alpinelinux.org/aports/commit/?id=7c957c41625c408c47ca8aa93fd986ac6fec39a2
https://git.alpinelinux.org/aports/commit/?id=c087d07fafa8d964c90795fd34c46fda72a152a4
https://git.alpinelinux.org/aports/commit/?id=f0377de9384c6b80e8d69a847c1c2450f68f50da
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.