The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 & Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface.
References
Link | Resource |
---|---|
https://twitter.com/SoloKeysSec | Product |
https://solokeys.com | Product |
https://eprint.iacr.org/2021/640 | Third Party Advisory |
https://www.aisec.fraunhofer.de/en/FirmwareProtection.html | Exploit Third Party Advisory |
https://github.com/solokeys/solo/commit/a9c02cd354f34b48195a342c7f524abdef5cbcec | Patch Third Party Advisory |
https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2021-05-21 05:15
Updated : 2021-05-28 08:41
NVD link : CVE-2020-27208
Mitre link : CVE-2020-27208
JSON object : View
CWE
CWE-326
Inadequate Encryption Strength
Products Affected
solokeys
- solo
- somu_firmware
- solo_firmware
- somu
nitrokey
- fido2
- fido2_firmware