During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 78.0 (excluding) |
Red Hat Enterprise Linux 7 | RedHat | nspr-0:4.25.0-2.el7_9 | * |
Red Hat Enterprise Linux 7 | RedHat | nss-0:3.53.1-3.el7_9 | * |
Red Hat Enterprise Linux 7 | RedHat | nss-softokn-0:3.53.1-6.el7_9 | * |
Red Hat Enterprise Linux 7 | RedHat | nss-util-0:3.53.1-1.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | nspr-0:4.25.0-2.el8_2 | * |
Red Hat Enterprise Linux 8 | RedHat | nss-0:3.53.1-11.el8_2 | * |
Red Hat OpenShift Do | RedHat | openshiftdo/odo-init-image-rhel7:1.1.3-2 | * |
Nss | Ubuntu | bionic | * |
Nss | Ubuntu | devel | * |
Nss | Ubuntu | eoan | * |
Nss | Ubuntu | focal | * |
Nss | Ubuntu | trusty | * |
Nss | Ubuntu | trusty/esm | * |
Nss | Ubuntu | upstream | * |
Nss | Ubuntu | xenial | * |