Vulnerability Name: | CVE-2020-12401 (CCN-186703) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2020-06-30 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2020-06-30 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-20 | ||||||||||||||||||||||||||||||||||||||||
Summary: | During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 4.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) 4.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.9 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 1.9 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-327 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-12401 Source: CCN Type: USN-4455-1 NSS vulnerabilities Source: security@mozilla.org Type: Issue Tracking, Permissions Required, Vendor Advisory security@mozilla.org Source: CCN Type: Red Hat Bugzilla Bug 1851294 (CVE-2020-12401) - CVE-2020-12401 nss: ECDSA timing attack mitigation bypass Source: CCN Type: Bugzilla Bug 1174763 CVE-2020-6829) VUL-0: CVE-2020-6829,CVE-2020-12400,CVE-2020-12401,CVE-2020-12403: mozilla-nss: Update to 3.55 Source: CCN Type: Mozilla Web site NSS 3.55 release notes Source: XF Type: UNKNOWN mozilla-nss-cve202012401-info-disc(186703) Source: security@mozilla.org Type: UNKNOWN security@mozilla.org Source: CCN Type: Mozilla Foundation Security Advisory 2020-36 Security Vulnerabilities fixed in Firefox 80 Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |