CVE-2020-36478

An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:logo\!_cmr2020_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:logo\!_cmr2020:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:logo\!_cmr2040_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:logo\!_cmr2040:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3031c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3031c:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3041c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3041c:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3030c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3030c:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3000c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3000c:-:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:29

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf - Patch, Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf - Patch, Third Party Advisory
References () https://github.com/ARMmbed/mbedtls/issues/3629 - Exploit, Third Party Advisory () https://github.com/ARMmbed/mbedtls/issues/3629 - Exploit, Third Party Advisory
References () https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9 - Release Notes, Third Party Advisory () https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9 - Release Notes, Third Party Advisory
References () https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0 - Release Notes, Third Party Advisory () https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0 - Release Notes, Third Party Advisory
References () https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18 - Release Notes, Third Party Advisory () https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18 - Release Notes, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html - Mailing List, Third Party Advisory

Information

Published : 2021-08-23 02:15

Updated : 2024-11-21 05:29


NVD link : CVE-2020-36478

Mitre link : CVE-2020-36478

CVE.ORG link : CVE-2020-36478


JSON object : View

Products Affected

siemens

  • logo\!_cmr2020
  • simatic_rtu3031c_firmware
  • simatic_rtu3041c_firmware
  • simatic_rtu3030c
  • simatic_rtu3000c
  • logo\!_cmr2020_firmware
  • simatic_rtu3041c
  • simatic_rtu3030c_firmware
  • simatic_rtu3031c
  • simatic_rtu3000c_firmware
  • logo\!_cmr2040_firmware
  • logo\!_cmr2040

arm

  • mbed_tls

debian

  • debian_linux
CWE
CWE-295

Improper Certificate Validation