Lucene search

K
cve[email protected]CVE-2017-15361
HistoryOct 16, 2017 - 5:29 p.m.

CVE-2017-15361

2017-10-1617:29:00
web.nvd.nist.gov
151
2
infineon
rsa
library
tpm
firmware
security vulnerability
roca
cryptographic protection
bitlocker
yubikey
pgp
chrome os

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.7 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.3%

The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.

Affected configurations

NVD
Node
infineontrusted_platform_firmwareMatch4.31
OR
infineontrusted_platform_firmwareMatch4.32
OR
infineontrusted_platform_firmwareMatch6.40
OR
infineontrusted_platform_firmwareMatch133.32
AND
acerc720_chromebookMatch-
OR
acerchromebaseMatch-
OR
acerchromebase_24Match-
OR
acerchromebook_11_c730Match-
OR
acerchromebook_11_c730eMatch-
OR
acerchromebook_11_c735Match-
OR
acerchromebook_11_c740Match-
OR
acerchromebook_11_c771Match-
OR
acerchromebook_11_c771tMatch-
OR
acerchromebook_11_n7_c731Match-
OR
acerchromebook_13_cb5-311Match-
OR
acerchromebook_14_cb3-431Match-
OR
acerchromebook_14_for_work_cp5-471Match-
OR
acerchromebook_15_cb3-531Match-
OR
acerchromebook_15_cb3-532Match-
OR
acerchromebook_15_cb5-571Match-
OR
acerchromebook_r11Match-
OR
acerchromebook_r13_cb5-312tMatch-
OR
acerchromeboxMatch-
OR
acerchromebox_cxi2Match-
OR
aopenchromebaseMatch-commercial
OR
aopenchromebaseMatch-mini
OR
aopenchromeboxMatch-commercial
OR
aopenchromeboxiMatch-mini
OR
asichromebookMatch-
OR
asuschromebit_cs10Match-
OR
asuschromebook_c200Match-
OR
asuschromebook_c201paMatch-
OR
asuschromebook_c202saMatch-
OR
asuschromebook_c300Match-
OR
asuschromebook_c300saMatch-
OR
asuschromebook_c301saMatch-
OR
asuschromebook_flip_c100paMatch-
OR
asuschromebook_flip_c302Match-
OR
asuschromebox_cn60Match-
OR
asuschromebox_cn62Match-
OR
bobicuschromebook_11
OR
ctlj2_chromebookMatch-education
OR
ctlj4_chromebookMatch-education
OR
ctlj5_chromebookMatch-
OR
ctln6_chromebookMatch-education
OR
ctlnl61_chromebookMatch-
OR
dellchromebook_11Match-
OR
dellchromebook_11_3120Match-
OR
dellchromebook_11_3189Match-
OR
dellchromebook_11_model_3180Match-
OR
dellchromebook_13_3380Match-
OR
dellchromeboxMatch-
OR
edugearchromebook_kMatch-
OR
edugearchromebook_mMatch-
OR
edugearchromebook_rMatch-
OR
edugearcmt_chromebookMatch-
OR
edxischromebookMatch-
OR
edxiseducation_chromebookMatch-
OR
epikchromebook_elb1101Match-
OR
googlepixelMatch-
OR
haierchromebook_11Match-
OR
haierchromebook_11_cMatch-
OR
haierchromebook_11_g2Match-
OR
haierchromebook_11eMatch-
OR
hexachromebook_piMatch-
OR
hisensechromebook_11Match-
OR
hpchromebookMatch-meetings
OR
hpchromebook_11-vxxxMatch-
OR
hpchromebook_11_1100-1199Match-
OR
hpchromebook_11_2000-2099Match-
OR
hpchromebook_11_2100-2199Match-
OR
hpchromebook_11_2200-2299Match-
OR
hpchromebook_11_g1Match-
OR
hpchromebook_11_g2Match-
OR
hpchromebook_11_g3Match-
OR
hpchromebook_11_g4\/g4_eeMatch-
OR
hpchromebook_11_g5Match-
OR
hpchromebook_11_g5_eeMatch-
OR
hpchromebook_13_g1Match-
OR
hpchromebook_14Match-
OR
hpchromebook_14_ak000-099Match-
OR
hpchromebook_14_g3Match-
OR
hpchromebook_14_g4Match-
OR
hpchromebook_14_x000-x999Match-
OR
hpchromebox_cb1-\(000-099\)Match-
OR
hpchromebox_g1Match-
OR
lenovo100s_chromebookMatch-
OR
lenovon20_chromebookMatch-
OR
lenovon21_chromebookMatch-
OR
lenovon22_chromebookMatch-
OR
lenovon23_chromebookMatch-
OR
lenovon23_flex_11_chromebookMatch-
OR
lenovon23_yoga_11_chromebookMatch-
OR
lenovon42_chromebookMatch-
OR
lenovothinkcentre_chromeboxMatch-
OR
lenovothinkpad_11e_chromebookMatch-
OR
lenovothinkpad_13_chromebookMatch-
OR
lgchromebase_22cb25sMatch-
OR
lgchromebase_22cv241Match-
OR
medionakoya_s2013Match-
OR
medionchromebook_s2015Match-
OR
mercerchromebookMatch-
OR
mercerv2_chromebookMatch-
OR
ncomputingchromebook_cx100Match-
OR
nexianchromebookMatch-
OR
pcmergechromebook_pcm-116t-432bMatch-
OR
poin2chromebook_11Match-
OR
poin2chromebook_14Match-
OR
positivochromebook_ch1190Match-
OR
prowiseentry_line_chromebookMatch-
OR
prowiseproline_chromebookMatch-
OR
rgseducation_chromebookMatch-
OR
samsungchromebook_2_11Match-
OR
samsungchromebook_2_11_xe500c12Match-
OR
samsungchromebook_2_13Match-
OR
samsungchromebook_3Match-
OR
samsungchromebook_plusMatch-
OR
samsungchromebook_proMatch-
OR
sector-fivee1_rugged_chromebookMatch-
OR
senkatelc1101_chromebookMatch-
OR
toshibachromebookMatch-
OR
toshibachromebook_2Match-
OR
toshibachromebook_2Match-2015
OR
trueidc_chromebookMatch-
OR
trueidc_chromebook_11Match-
OR
videonetchromebookMatch-
OR
videonetchromebook_bl10Match-
OR
viglenchromebook_11Match-
OR
viglenchromebook_360Match-
OR
xolochromebookMatch-
Node
infineonrsa_libraryRange1.02.013

References

Social References

More

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.7 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.3%