Vulnerability Name: | CVE-2020-27208 (CCN-202238) | ||||||||||||||||||||||||||||
Assigned: | 2020-10-19 | ||||||||||||||||||||||||||||
Published: | 2020-10-19 | ||||||||||||||||||||||||||||
Updated: | 2021-05-28 | ||||||||||||||||||||||||||||
Summary: | The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 & Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 6.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-326 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-27208 Source: MISC Type: Third Party Advisory https://eprint.iacr.org/2021/640 Source: XF Type: UNKNOWN solokeys-cve202027208-sec-bypass(202238) Source: MISC Type: Patch, Third Party Advisory https://github.com/solokeys/solo/commit/a9c02cd354f34b48195a342c7f524abdef5cbcec Source: MISC Type: Product https://solokeys.com Source: CCN Type: SoloKeys Web site Solo and Somu Source: MISC Type: Product https://twitter.com/SoloKeysSec Source: MISC Type: Third Party Advisory https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html Source: CCN Type: Fraunhofer Web page Shedding too much Light on a Microcontroller's Firmware Protection Source: MISC Type: Exploit, Third Party Advisory https://www.aisec.fraunhofer.de/en/FirmwareProtection.html Source: CCN Type: Nitrokey Web site Nitrokey FIDO2 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |