CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
73.1%
The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.
Vendor | Product | Version | CPE |
---|---|---|---|
infineon | trusted_platform_firmware | 4.31 | cpe:2.3:o:infineon:trusted_platform_firmware:4.31:*:*:*:*:*:*:* |
infineon | trusted_platform_firmware | 4.32 | cpe:2.3:o:infineon:trusted_platform_firmware:4.32:*:*:*:*:*:*:* |
infineon | trusted_platform_firmware | 6.40 | cpe:2.3:o:infineon:trusted_platform_firmware:6.40:*:*:*:*:*:*:* |
infineon | trusted_platform_firmware | 133.32 | cpe:2.3:o:infineon:trusted_platform_firmware:133.32:*:*:*:*:*:*:* |
acer | c720_chromebook | - | cpe:2.3:h:acer:c720_chromebook:-:*:*:*:*:*:*:* |
acer | chromebase | - | cpe:2.3:h:acer:chromebase:-:*:*:*:*:*:*:* |
acer | chromebase_24 | - | cpe:2.3:h:acer:chromebase_24:-:*:*:*:*:*:*:* |
acer | chromebook_11_c730 | - | cpe:2.3:h:acer:chromebook_11_c730:-:*:*:*:*:*:*:* |
acer | chromebook_11_c730e | - | cpe:2.3:h:acer:chromebook_11_c730e:-:*:*:*:*:*:*:* |
acer | chromebook_11_c735 | - | cpe:2.3:h:acer:chromebook_11_c735:-:*:*:*:*:*:*:* |
support.lenovo.com/us/en/product_security/LEN-15552
www.securityfocus.com/bid/101484
arstechnica.com/information-technology/2017/10/crypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids/
blog.cr.yp.to/20171105-infineon.html
cert-portal.siemens.com/productcert/pdf/ssa-470231.pdf
crocs.fi.muni.cz/public/papers/rsa_ccs17
dan.enigmabridge.com/roca-vulnerability-impact-on-gemalto-idprime-net-smart-cards/
github.com/crocs-muni/roca
github.com/iadgov/Detect-CVE-2017-15361-TPM
ics-cert.us-cert.gov/advisories/ICSA-18-058-01
keychest.net/roca
monitor.certipath.com/rsatest
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170012
security.netapp.com/advisory/ntap-20171024-0001/
sites.google.com/a/chromium.org/dev/chromium-os/tpm_firmware_update
support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03789en_us
support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03801en_us
www.infineon.com/cms/en/product/promopages/tpm-update/?redirId=59160
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00104.html
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00148.html
www.kb.cert.org/vuls/id/307015
www.yubico.com/support/security-advisories/ysa-2017-01/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
73.1%