Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
References
Link | Resource |
---|---|
https://github.com/bcgit/bc-csharp/wiki/CVE-2020-15522 | Third Party Advisory |
https://www.bouncycastle.org/releasenotes.html | Release Notes Vendor Advisory |
https://github.com/bcgit/bc-java/wiki/CVE-2020-15522 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210622-0007/ |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-05-20 05:15
Updated : 2021-06-22 02:15
NVD link : CVE-2020-15522
Mitre link : CVE-2020-15522
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
bouncycastle
- legion-of-the-bouncy-castle-fips-java-api
- the_bouncy_castle_crypto_package_for_java
- bc-csharp
- bouncy_castle_fips_.net_api