cvelist/2020/20xxx/CVE-2020-20949.json

82 lines
2.9 KiB
JSON
Raw Normal View History

2020-08-13 11:05:31 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-01-20 16:02:31 +00:00
"ID": "CVE-2020-20949",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
2020-08-13 11:05:31 +00:00
},
2021-01-20 16:02:31 +00:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-08-13 11:05:31 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-01-20 16:02:31 +00:00
"value": "Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf",
"refsource": "MISC",
"name": "http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf"
},
{
"url": "http://st.com",
"refsource": "MISC",
"name": "http://st.com"
},
{
"url": "http://x-cube-cryptolib.com",
"refsource": "MISC",
"name": "http://x-cube-cryptolib.com"
},
{
"url": "https://www.st.com/en/embedded-software/x-cube-cryptolib.html",
"refsource": "MISC",
"name": "https://www.st.com/en/embedded-software/x-cube-cryptolib.html"
},
{
"refsource": "MISC",
"name": "https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb",
"url": "https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb"
2020-08-13 11:05:31 +00:00
}
]
}
}