CVE Vulnerabilities

CVE-2020-6829

Published: Oct 28, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
4.4 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*80.0 (excluding)
Red Hat Enterprise Linux 7RedHatnspr-0:4.25.0-2.el7_9*
Red Hat Enterprise Linux 7RedHatnss-0:3.53.1-3.el7_9*
Red Hat Enterprise Linux 7RedHatnss-softokn-0:3.53.1-6.el7_9*
Red Hat Enterprise Linux 7RedHatnss-util-0:3.53.1-1.el7_9*
Red Hat Enterprise Linux 8RedHatnss-0:3.53.1-17.el8_3*
Red Hat OpenShift DoRedHatopenshiftdo/odo-init-image-rhel7:1.1.3-2*
FirefoxUbuntubionic*
FirefoxUbuntudevel*
FirefoxUbuntufocal*
FirefoxUbuntutrusty*
FirefoxUbuntuupstream*
FirefoxUbuntuxenial*
NssUbuntubionic*
NssUbuntudevel*
NssUbuntuesm-infra-legacy/trusty*
NssUbuntuesm-infra/bionic*
NssUbuntuesm-infra/focal*
NssUbuntuesm-infra/xenial*
NssUbuntufocal*
NssUbuntutrusty*
NssUbuntutrusty/esm*
NssUbuntuupstream*
NssUbuntuxenial*

References