CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
23.7%
An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before
2.7.15. An attacker that can get precise enough side-channel measurements
can recover the long-term ECDSA private key by (1) reconstructing the
projective coordinate of the result of scalar multiplication by exploiting
side channels in the conversion to affine coordinates; (2) using an attack
described by Naccache, Smart, and Stern in 2003 to recover a few bits of
the ephemeral scalar from those projective coordinates via several
measurements; and (3) using a lattice attack to get from there to the
long-term ECDSA private key used for the signatures. Typically an attacker
would have sufficient access when attacking an SGX enclave and controlling
the untrusted OS.
launchpad.net/bugs/cve/CVE-2020-10932
nvd.nist.gov/vuln/detail/CVE-2020-10932
security-tracker.debian.org/tracker/CVE-2020-10932
tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released
tls.mbed.org/tech-updates/security-advisories
tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-04
www.cve.org/CVERecord?id=CVE-2020-10932
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
23.7%