CVE-2020-36424
low-risk
Published 2021-07-19
An issue was discovered in Arm Mbed TLS before 2.24.0. An attacker can recover a private key (for RSA or static Diffie-Hellman) via a side-channel attack against generation of base blinding/unblinding values.
Do I need to act?
-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (2)
References (12)
Issue Tracking
https://bugs.gentoo.org/740108
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.8
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.24.0
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.17
Issue Tracking
https://bugs.gentoo.org/740108
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.8
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.24.0
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.17
20
/ 100
low-risk
Severity
12/34 · Low
Exploitability
1/34 · Minimal
Exposure
7/34 · Low