Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-0495

Summary
Assigner-debian
Assigner Org ID-79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At-13 Jun, 2018 | 23:00
Updated At-05 Aug, 2024 | 03:28
Rejected At-
Credits

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:debian
Assigner Org ID:79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At:13 Jun, 2018 | 23:00
Updated At:05 Aug, 2024 | 03:28
Rejected At:
▼CVE Numbering Authority (CNA)

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Affected Products
Vendor
n/a
Product
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3
Versions
Affected
  • Libgcrypt before 1.7.10 and 1.8.x before 1.8.3
Problem Types
TypeCWE IDDescription
textN/Aside-channel attack
Type: text
CWE ID: N/A
Description: side-channel attack
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
x_refsource_MISC
http://www.securitytracker.com/id/1041144
vdb-entry
x_refsource_SECTRACK
https://usn.ubuntu.com/3850-1/
vendor-advisory
x_refsource_UBUNTU
http://www.securitytracker.com/id/1041147
vdb-entry
x_refsource_SECTRACK
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
x_refsource_MISC
https://usn.ubuntu.com/3689-1/
vendor-advisory
x_refsource_UBUNTU
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
x_refsource_MISC
https://usn.ubuntu.com/3689-2/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3692-2/
vendor-advisory
x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
mailing-list
x_refsource_MLIST
https://www.debian.org/security/2018/dsa-4231
vendor-advisory
x_refsource_DEBIAN
https://access.redhat.com/errata/RHSA-2018:3505
vendor-advisory
x_refsource_REDHAT
https://usn.ubuntu.com/3850-2/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3692-1/
vendor-advisory
x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:3221
vendor-advisory
x_refsource_REDHAT
https://dev.gnupg.org/T4011
x_refsource_MISC
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
x_refsource_MISC
https://access.redhat.com/errata/RHSA-2019:1297
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:1296
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:1543
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:2237
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id/1041144
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://usn.ubuntu.com/3850-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.securitytracker.com/id/1041147
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Resource:
x_refsource_MISC
Hyperlink: https://usn.ubuntu.com/3689-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
Resource:
x_refsource_MISC
Hyperlink: https://usn.ubuntu.com/3689-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3692-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://www.debian.org/security/2018/dsa-4231
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3505
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://usn.ubuntu.com/3850-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3692-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3221
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://dev.gnupg.org/T4011
Resource:
x_refsource_MISC
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Resource:
x_refsource_MISC
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1297
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1296
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1543
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2237
Resource:
vendor-advisory
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id/1041144
vdb-entry
x_refsource_SECTRACK
x_transferred
https://usn.ubuntu.com/3850-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.securitytracker.com/id/1041147
vdb-entry
x_refsource_SECTRACK
x_transferred
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
x_refsource_MISC
x_transferred
https://usn.ubuntu.com/3689-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
x_refsource_MISC
x_transferred
https://usn.ubuntu.com/3689-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3692-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
mailing-list
x_refsource_MLIST
x_transferred
https://www.debian.org/security/2018/dsa-4231
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://access.redhat.com/errata/RHSA-2018:3505
vendor-advisory
x_refsource_REDHAT
x_transferred
https://usn.ubuntu.com/3850-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3692-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://access.redhat.com/errata/RHSA-2018:3221
vendor-advisory
x_refsource_REDHAT
x_transferred
https://dev.gnupg.org/T4011
x_refsource_MISC
x_transferred
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
x_refsource_MISC
x_transferred
https://access.redhat.com/errata/RHSA-2019:1297
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2019:1296
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2019:1543
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2019:2237
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id/1041144
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://usn.ubuntu.com/3850-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.securitytracker.com/id/1041147
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://usn.ubuntu.com/3689-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://usn.ubuntu.com/3689-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3692-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4231
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3505
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://usn.ubuntu.com/3850-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3692-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3221
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://dev.gnupg.org/T4011
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1297
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1296
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1543
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2237
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@debian.org
Published At:13 Jun, 2018 | 23:29
Updated At:07 Nov, 2023 | 02:51

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.04.7MEDIUM
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.0
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

gnupg
gnupg
>>libgcrypt>>Versions before 1.7.10(exclusive)
cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*
gnupg
gnupg
>>libgcrypt>>Versions from 1.8.0(inclusive) to 1.8.3(exclusive)
cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>17.10
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>18.04
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>18.10
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>8.0
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>9.0
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>ansible_tower>>3.3
cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>7.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server>>7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation>>7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>traffic_director>>11.1.1.9.0
cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securitytracker.com/id/1041144security@debian.org
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1041147security@debian.org
Third Party Advisory
VDB Entry
https://access.redhat.com/errata/RHSA-2018:3221security@debian.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505security@debian.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1296security@debian.org
N/A
https://access.redhat.com/errata/RHSA-2019:1297security@debian.org
N/A
https://access.redhat.com/errata/RHSA-2019:1543security@debian.org
N/A
https://access.redhat.com/errata/RHSA-2019:2237security@debian.org
N/A
https://dev.gnupg.org/T4011security@debian.org
Patch
Vendor Advisory
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965security@debian.org
N/A
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.htmlsecurity@debian.org
Mailing List
Third Party Advisory
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.htmlsecurity@debian.org
Vendor Advisory
https://usn.ubuntu.com/3689-1/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3689-2/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3692-1/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3692-2/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3850-1/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3850-2/security@debian.org
Third Party Advisory
https://www.debian.org/security/2018/dsa-4231security@debian.org
Third Party Advisory
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/security@debian.org
Exploit
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlsecurity@debian.org
Patch
Third Party Advisory
Hyperlink: http://www.securitytracker.com/id/1041144
Source: security@debian.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1041147
Source: security@debian.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3221
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3505
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1296
Source: security@debian.org
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1297
Source: security@debian.org
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1543
Source: security@debian.org
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2237
Source: security@debian.org
Resource: N/A
Hyperlink: https://dev.gnupg.org/T4011
Source: security@debian.org
Resource:
Patch
Vendor Advisory
Hyperlink: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
Source: security@debian.org
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
Source: security@debian.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
Source: security@debian.org
Resource:
Vendor Advisory
Hyperlink: https://usn.ubuntu.com/3689-1/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3689-2/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3692-1/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3692-2/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3850-1/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3850-2/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4231
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Source: security@debian.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Source: security@debian.org
Resource:
Patch
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

208Records found

CVE-2019-18673
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.14% / 34.41%
||
7 Day CHG~0.00%
Published-02 Nov, 2019 | 16:25
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On SHIFT BitBox02 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. Note: BIP39 secrets are not displayed by default on this device. The side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.

Action-Not Available
Vendor-shiftcrypton/a
Product-bitbox02n/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-31406
Matching Score-4
Assigner-Vaadin Ltd.
ShareView Details
Matching Score-4
Assigner-Vaadin Ltd.
CVSS Score-4||MEDIUM
EPSS-0.05% / 16.81%
||
7 Day CHG~0.00%
Published-23 Apr, 2021 | 16:05
Updated-17 Sep, 2024 | 00:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing side channel vulnerability in endpoint request handler in Vaadin 15-19

Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.

Action-Not Available
Vendor-vaadinVaadin
Product-flowvaadinflow-serverVaadin
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-31403
Matching Score-4
Assigner-Vaadin Ltd.
ShareView Details
Matching Score-4
Assigner-Vaadin Ltd.
CVSS Score-4||MEDIUM
EPSS-0.13% / 33.13%
||
7 Day CHG~0.00%
Published-23 Apr, 2021 | 16:05
Updated-16 Sep, 2024 | 22:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing side channel vulnerability in UIDL request handler in Vaadin 7 and 8

Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:vaadin-server versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security token via timing attack

Action-Not Available
Vendor-vaadinVaadin
Product-vaadinvaadin-serverVaadin
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-14357
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.4||LOW
EPSS-0.06% / 18.16%
||
7 Day CHG~0.00%
Published-10 Aug, 2019 | 15:54
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On Mooltipass Mini devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that an attack is not "realistically implementable.

Action-Not Available
Vendor-mooltipassn/a
Product-mooltipass_minimooltipass_mini_firmwaren/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-14355
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.4||LOW
EPSS-0.06% / 18.16%
||
7 Day CHG~0.00%
Published-10 Aug, 2019 | 15:41
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On ShapeShift KeepKey devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover secret data shown on the display. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that there is "insignificant risk.

Action-Not Available
Vendor-shapeshiftn/a
Product-keepkey_firmwarekeepkeyn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-14360
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.14% / 34.41%
||
7 Day CHG~0.00%
Published-02 Nov, 2019 | 16:27
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On Hyundai Pay Kasse HK-1000 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.

Action-Not Available
Vendor-hyundai-payn/a
Product-hk-1000n/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-14354
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.4||LOW
EPSS-0.06% / 18.16%
||
7 Day CHG~0.00%
Published-10 Aug, 2019 | 15:07
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On Ledger Nano S and Nano X devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.

Action-Not Available
Vendor-ledgern/a
Product-nano_s_firmwarenano_xnano_x_firmwarenano_sn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-31404
Matching Score-4
Assigner-Vaadin Ltd.
ShareView Details
Matching Score-4
Assigner-Vaadin Ltd.
CVSS Score-4||MEDIUM
EPSS-0.05% / 14.61%
||
7 Day CHG~0.00%
Published-23 Apr, 2021 | 16:05
Updated-16 Sep, 2024 | 23:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18

Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.

Action-Not Available
Vendor-vaadinVaadin
Product-flowvaadinflow-serverVaadin
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found