CVE-2020-12399
low-risk
Published 2020-07-09
NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.4/10
Medium
LOCAL
/ HIGH complexity
Affected Products (4)
References (16)
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
Third Party Advisory
https://security.gentoo.org/glsa/202007-49
Third Party Advisory
https://usn.ubuntu.com/4421-1/
Third Party Advisory
https://www.debian.org/security/2020/dsa-4726
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2020-20/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2020-21/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2020-22/
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
Third Party Advisory
https://security.gentoo.org/glsa/202007-49
Third Party Advisory
https://usn.ubuntu.com/4421-1/
Third Party Advisory
https://www.debian.org/security/2020/dsa-4726
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2020-20/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2020-21/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2020-22/
21
/ 100
low-risk
Severity
11/34 · Low
Exploitability
0/34 · Minimal
Exposure
10/34 · Low