"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-01-07 16:01:43 +00:00
parent 0f4c9b464b
commit 88be7372fd
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 65 additions and 6 deletions

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://hackerone.com/reports/988103",
"url": "https://hackerone.com/reports/988103"
},
{
"refsource": "DEBIAN",
"name": "DSA-4826",
"url": "https://www.debian.org/security/2021/dsa-4826"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4826",
"url": "https://www.debian.org/security/2021/dsa-4826"
}
]
},

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3011",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-3011",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An electromagnetic-wave side-channel issue was discovered on NXP SmartMX / P5x security microcontrollers and A7x secure authentication microcontrollers, with CryptoLib through v2.9. It allows attackers to extract the ECDSA private key after extensive physical access (and consequently produce a clone). This was demonstrated on the Google Titan Security Key, based on an NXP A7005a chip. Other FIDO U2F security keys are also impacted (Yubico YubiKey Neo and Feitian K9, K13, K21, and K40) as well as several NXP JavaCard smartcards (J3A081, J2A081, J3A041, J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61, J3D081_M59_DF, J3D081_M61_DF, J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64, J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, J2E082_M65, J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF, and J3E016_M64_DF)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://ninjalab.io/wp-content/uploads/2021/01/a_side_journey_to_titan.pdf",
"url": "https://ninjalab.io/wp-content/uploads/2021/01/a_side_journey_to_titan.pdf"
},
{
"refsource": "MISC",
"name": "https://ninjalab.io/a-side-journey-to-titan/",
"url": "https://ninjalab.io/a-side-journey-to-titan/"
}
]
}