CVE-2020-36478

An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:logo\!_cmr2020_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:logo\!_cmr2020:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:logo\!_cmr2040_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:logo\!_cmr2040:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3031c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3031c:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3041c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3041c:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3030c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3030c:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3000c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3000c:-:*:*:*:*:*:*:*

Configuration 8 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2021-08-23 02:15

Updated : 2021-11-26 21:35


NVD link : CVE-2020-36478

Mitre link : CVE-2020-36478


JSON object : View

Products Affected

siemens

  • simatic_rtu3000c_firmware
  • simatic_rtu3030c
  • simatic_rtu3030c_firmware
  • logo\!_cmr2040_firmware
  • simatic_rtu3000c
  • simatic_rtu3041c
  • simatic_rtu3031c_firmware
  • logo\!_cmr2040
  • logo\!_cmr2020
  • simatic_rtu3031c
  • simatic_rtu3041c_firmware
  • logo\!_cmr2020_firmware

arm

  • mbed_tls

debian

  • debian_linux
CWE
CWE-295

Improper Certificate Validation