Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-32482
HistoryApr 23, 2024 - 5:38 p.m.

CVE-2024-32482 Tillitis TKey Signer possible RAM disclosure vulnerability

2024-04-2317:38:09
CWE-125
CWE-367
GitHub_M
www.cve.org
tillitis tkey signer
ram disclosure
cve-2024-32482
usb interface
upgrade
vulnerability
client application
secret disclosure

2.2 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

The Tillitis TKey signer device application is an ed25519 signing tool. A vulnerability has been found that makes it possible to disclose portions of the TKey’s data in RAM over the USB interface. To exploit the vulnerability an attacker needs to use a custom client application and to touch the TKey. No secret is disclosed. All client applications integrating tkey-device-signer should upgrade to version 1.0.0 to receive a fix. No known workarounds are available.

CNA Affected

[
  {
    "vendor": "tillitis",
    "product": "tkey-device-signer",
    "versions": [
      {
        "version": "< 1.0.0",
        "status": "affected"
      }
    ]
  }
]

2.2 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-32482