Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
References
| Link | Resource |
|---|---|
| https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb | Technical Description Third Party Advisory |
| http://microchip.com | Product |
| https://www.microchip.com/mplab/microchip-libraries-for-applications | Product |
| http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf | Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
| AND |
|
Information
Published : 2021-01-19 13:15
Updated : 2021-09-08 17:22
NVD link : CVE-2020-20950
Mitre link : CVE-2020-20950
JSON object : View
Products Affected
microchip
- microchip_libraries_for_applications
ietf
- public_key_cryptography_standards_\#1
apple
- macos
linux
- linux_kernel
microsoft
- windows
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
