CVE-2020-20950

Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ietf:public_key_cryptography_standards_\#1:1.5:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:microchip:microchip_libraries_for_applications:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:12

Type Values Removed Values Added
References () http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf - Technical Description, Third Party Advisory () http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf - Technical Description, Third Party Advisory
References () http://microchip.com - Product () http://microchip.com - Product
References () https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb - Technical Description, Third Party Advisory () https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb - Technical Description, Third Party Advisory
References () https://www.microchip.com/mplab/microchip-libraries-for-applications - Product () https://www.microchip.com/mplab/microchip-libraries-for-applications - Product

Information

Published : 2021-01-19 13:15

Updated : 2024-11-21 05:12


NVD link : CVE-2020-20950

Mitre link : CVE-2020-20950

CVE.ORG link : CVE-2020-20950


JSON object : View

Products Affected

linux

  • linux_kernel

apple

  • macos

microsoft

  • windows

ietf

  • public_key_cryptography_standards_\#1

microchip

  • microchip_libraries_for_applications
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm