The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 & Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface.
References
| Link | Resource |
|---|---|
| https://twitter.com/SoloKeysSec | Product |
| https://solokeys.com | Product |
| https://eprint.iacr.org/2021/640 | Third Party Advisory |
| https://www.aisec.fraunhofer.de/en/FirmwareProtection.html | Exploit Third Party Advisory |
| https://github.com/solokeys/solo/commit/a9c02cd354f34b48195a342c7f524abdef5cbcec | Patch Third Party Advisory |
| https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Information
Published : 2021-05-21 05:15
Updated : 2021-05-28 08:41
NVD link : CVE-2020-27208
Mitre link : CVE-2020-27208
JSON object : View
CWE
CWE-326
Inadequate Encryption Strength
Products Affected
solokeys
- solo
- somu_firmware
- solo_firmware
- somu
nitrokey
- fido2
- fido2_firmware


