Lucene search

K
f5F5F5:K32412503
HistoryNov 14, 2019 - 12:00 a.m.

K32412503 : Trusted Platform Module vulnerabilities CVE-2019-11090 and CVE-2019-16863

2019-11-1400:00:00
my.f5.com
35

5.7 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.2%

Security Advisory Description

Cryptographic timing conditions in the subsystem for Intel® PTT before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.0 and 14.0.10; Intel® TXE 3.1.70 and 4.0.20; Intel® SPS before versions SPS_E5_04.01.04.305.0, SPS_SoC-X_04.00.04.108.0, SPS_SoC-A_04.00.04.191.0, SPS_E3_04.01.04.086.0, SPS_E3_04.08.04.047.0 may allow an unauthenticated user to potentially enable information disclosure via network access.

STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.

Impact

There is no impact; F5 products are not affected by this vulnerability.

5.7 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.2%