CVE-2024-32482

The Tillitis TKey signer device application is an ed25519 signing tool. A vulnerability has been found that makes it possible to disclose portions of the TKey’s data in RAM over the USB interface. To exploit the vulnerability an attacker needs to use a custom client application and to touch the TKey. No secret is disclosed. All client applications integrating tkey-device-signer should upgrade to version 1.0.0 to receive a fix. No known workarounds are available.
Configurations

No configuration.

History

21 Nov 2024, 09:15

Type Values Removed Values Added
References () https://bugbounty.tillitis.se/security-bulletins/tillitis-security-bulletin-240115-1 - () https://bugbounty.tillitis.se/security-bulletins/tillitis-security-bulletin-240115-1 -
References () https://github.com/tillitis/tkey-device-signer/security/advisories/GHSA-frqc-62hv-379p - () https://github.com/tillitis/tkey-device-signer/security/advisories/GHSA-frqc-62hv-379p -

24 Apr 2024, 13:39

Type Values Removed Values Added
Summary
  • (es) La aplicación del dispositivo de firma Tillitis TKey es una herramienta de firma ed25519. Se ha encontrado una vulnerabilidad que permite revelar partes de los datos del TKey en la RAM a través de la interfaz USB. Para explotar la vulnerabilidad, un atacante necesita utilizar una aplicación cliente personalizada y tocar la tecla TKey. No se revela ningún secreto. Todas las aplicaciones cliente que integran tkey-device-signer deben actualizarse a la versión 1.0.0 para recibir una solución. No hay workarounds disponibles.

23 Apr 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-23 18:15

Updated : 2024-11-21 09:15


NVD link : CVE-2024-32482

Mitre link : CVE-2024-32482

CVE.ORG link : CVE-2024-32482


JSON object : View

Products Affected

No product.

CWE
CWE-125

Out-of-bounds Read

CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition