Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
References
Link | Resource |
---|---|
http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf | Technical Description Third Party Advisory |
http://st.com | Product |
http://x-cube-cryptolib.com | Broken Link |
https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb | Technical Description Third Party Advisory |
https://www.st.com/en/embedded-software/x-cube-cryptolib.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2021-01-20 16:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-20949
Mitre link : CVE-2020-20949
CVE.ORG link : CVE-2020-20949
JSON object : View
Products Affected
st
- stm32cubef3
- stm32cubemp1
- stm32cubewl
- stm32cubeg4
- stm32cubel0
- stm32cubeide
- stm32cubeh7
- stm32cubeg0
- stm32cubef0
- stm32cubef4
- stm32cubef2
- stm32cubel4
- stm32cubewb
- stm32cubef1
- stm32cubef7
- stm32cubel4\+
- stm32cubeprogrammer
- stm32cubel5
- stm32cubemx
- stm32cubemonitor
- stm32cubel1
ietf
- public_key_cryptography_standards_\#1
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm