SB2020070202 - Multiple vulnerabilities in Mbed TLS 



SB2020070202 - Multiple vulnerabilities in Mbed TLS

Published: July 2, 2020 Updated: January 11, 2023

Security Bulletin ID SB2020070202
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Cryptographic issues (CVE-ID: CVE-2020-36422)

The vulnerability allows a local user to perform a side-channel attack.

The vulnerability exists due to missing randomization in the mbedtls_ecp_check_pub_priv(), mbedtls_pk_parse_key(), mbedtls_pk_parse_keyfile(), mbedtls_ecp_mul(), and mbedtls_ecp_mul_restartable() functions in Mbed TLS. A local user can perform a side-channel attack on ECC key import and fully recover the private key after collecting a single trace of any of the affected functions.


2) Cleartext transmission of sensitive information (CVE-ID: CVE-2020-36423)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to an issue in Lucky 13 counter-measure that could make it ineffective when hardware accelerators were used (using one of the MBEDTLS_SHAxxx_ALT macros). A remote attacker can gain access to sensitive information.


3) Cryptographic issues (CVE-ID: CVE-2020-36421)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to a side channel in modular exponentiation. A remote attacker can disclose the RSA private key used in a secure enclave.


Remediation

Install update from vendor's website.