Vulnerability CVE-2020-12402: Information

Description

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

Severity: MEDIUM (4.4) Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N

Published: July 9, 2020
Modified: Nov. 7, 2023
Error type identifier: CWE-203

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.mozilla.org/security/advisories/mfsa2020-24/
  • Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
  • Issue Tracking
  • Permissions Required
  • Vendor Advisory
openSUSE-SU-2020:0953
  • Third Party Advisory
openSUSE-SU-2020:0955
  • Third Party Advisory
USN-4417-1
  • Third Party Advisory
openSUSE-SU-2020:0983
  • Third Party Advisory
DSA-4726
  • Third Party Advisory
openSUSE-SU-2020:1017
  • Third Party Advisory
GLSA-202007-10
  • Third Party Advisory
USN-4417-2
  • Third Party Advisory
[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
  • Mailing List
  • Third Party Advisory
FEDORA-2020-3ef1937475
    FEDORA-2020-16741ac7ff
        1. Configuration 1

          cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
          End excliding
          78.0

          Configuration 2

          cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

          cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

          cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

          Configuration 3

          cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*