Lucene search

K
nvd[email protected]NVD:CVE-2021-3011
HistoryJan 07, 2021 - 4:15 p.m.

CVE-2021-3011

2021-01-0716:15:12
CWE-670
web.nvd.nist.gov
7
nxp smartmx
p5x
a7x
cryptolib
ecdsa
google titan security key
fido u2f
yubico yubikey neo
feitian k9
feitian k13
feitian k21
feitian k40
javacard smartcards
side-channel vulnerability

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS3

4.2

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

4.5

Confidence

High

EPSS

0.001

Percentile

40.7%

An electromagnetic-wave side-channel issue was discovered on NXP SmartMX / P5x security microcontrollers and A7x secure authentication microcontrollers, with CryptoLib through v2.9. It allows attackers to extract the ECDSA private key after extensive physical access (and consequently produce a clone). This was demonstrated on the Google Titan Security Key, based on an NXP A7005a chip. Other FIDO U2F security keys are also impacted (Yubico YubiKey Neo and Feitian K9, K13, K21, and K40) as well as several NXP JavaCard smartcards (J3A081, J2A081, J3A041, J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61, J3D081_M59_DF, J3D081_M61_DF, J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64, J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, J2E082_M65, J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF, and J3E016_M64_DF).

Affected configurations

Nvd
Node
ftsafek13Match-
OR
ftsafek21Match-
OR
ftsafek40Match-
OR
ftsafek9Match-
OR
googletitan_security_keyMatch-
OR
nxp3a081Match-
OR
nxpa7005aMatch-
OR
nxpj2a081Match-
OR
nxpj2d081_m59Match-
OR
nxpj2d081_m61Match-
OR
nxpj2d082_m60Match-
OR
nxpj2d120_m60Match-
OR
nxpj2d145_m59Match-
OR
nxpj2e081_m64Match-
OR
nxpj2e082_m65Match-
OR
nxpj2e120_m65Match-
OR
nxpj2e145_m64Match-
OR
nxpj3a041Match-
OR
nxpj3d081_m59Match-
OR
nxpj3d081_m59_dfMatch-
OR
nxpj3d081_m61Match-
OR
nxpj3d081_m61_dfMatch-
OR
nxpj3d082_m60Match-
OR
nxpj3d120_m60Match-
OR
nxpj3d145_m59Match-
OR
nxpj3e016_m64Match-
OR
nxpj3e016_m64_dfMatch-
OR
nxpj3e016_m66Match-
OR
nxpj3e016_m66_dfMatch-
OR
nxpj3e041_m64Match-
OR
nxpj3e041_m64_dfMatch-
OR
nxpj3e041_m66Match-
OR
nxpj3e041_m66_dfMatch-
OR
nxpj3e081_m64Match-
OR
nxpj3e081_m64_dfMatch-
OR
nxpj3e081_m66Match-
OR
nxpj3e081_m66_dfMatch-
OR
nxpj3e082_m65Match-
OR
nxpj3e120_m65Match-
OR
nxpj3e145_m64Match-
OR
nxpp5010Match-
OR
nxpp5020Match-
OR
nxpp5021Match-
OR
nxpp5040Match-
OR
yubicoyubikey_neoMatch-
VendorProductVersionCPE
ftsafek13-cpe:2.3:h:ftsafe:k13:-:*:*:*:*:*:*:*
ftsafek21-cpe:2.3:h:ftsafe:k21:-:*:*:*:*:*:*:*
ftsafek40-cpe:2.3:h:ftsafe:k40:-:*:*:*:*:*:*:*
ftsafek9-cpe:2.3:h:ftsafe:k9:-:*:*:*:*:*:*:*
googletitan_security_key-cpe:2.3:h:google:titan_security_key:-:*:*:*:*:*:*:*
nxp3a081-cpe:2.3:h:nxp:3a081:-:*:*:*:*:*:*:*
nxpa7005a-cpe:2.3:h:nxp:a7005a:-:*:*:*:*:*:*:*
nxpj2a081-cpe:2.3:h:nxp:j2a081:-:*:*:*:*:*:*:*
nxpj2d081_m59-cpe:2.3:h:nxp:j2d081_m59:-:*:*:*:*:*:*:*
nxpj2d081_m61-cpe:2.3:h:nxp:j2d081_m61:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 451

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS3

4.2

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

4.5

Confidence

High

EPSS

0.001

Percentile

40.7%

Related for NVD:CVE-2021-3011