Lucene search

K
cve[email protected]CVE-2024-32482
HistoryApr 23, 2024 - 6:15 p.m.

CVE-2024-32482

2024-04-2318:15:14
CWE-367
CWE-125
web.nvd.nist.gov
31
tillitis tkey
vulnerability disclosure
usb interface
ram
custom client application
tkey-device-signer
upgrade
no secret disclosure

2.2 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

The Tillitis TKey signer device application is an ed25519 signing tool. A vulnerability has been found that makes it possible to disclose portions of the TKey’s data in RAM over the USB interface. To exploit the vulnerability an attacker needs to use a custom client application and to touch the TKey. No secret is disclosed. All client applications integrating tkey-device-signer should upgrade to version 1.0.0 to receive a fix. No known workarounds are available.

Affected configurations

Vulners
Node
tillitistkey_device_signerRange<1.0.0

CNA Affected

[
  {
    "vendor": "tillitis",
    "product": "tkey-device-signer",
    "versions": [
      {
        "version": "< 1.0.0",
        "status": "affected"
      }
    ]
  }
]

2.2 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

Related for CVE-2024-32482