2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2019-16863" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2019-11-14T03:15:11.510" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T03:06:01.987" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL."
} ,
{
"lang" : "es" ,
"value" : "Los dispositivos STMicroelectronics ST33TPHF2ESPI TPM antes del 12-09-2019, permiten a atacantes extraer la clave privada ECDSA por medio de un ataque de sincronizaci\u00f3n de canal lateral porque la multiplicaci\u00f3n escalar de ECDSA es manejada inapropiadamente, tambi\u00e9n se conoce como TPM-FAIL."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.9 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:N" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.3
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-203"
} ,
{
"lang" : "en" ,
"value" : "CWE-327"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf2espi_firmware:71.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E02FA82-86F3-455A-96B4-0CF6AD5300AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf2espi_firmware:71.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D45CA39E-D389-4814-9F17-BB80E31111D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf2espi_firmware:71.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16E689C5-8859-4324-929D-5F22BF852699"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf2espi_firmware:73.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "00ED1FEA-D1BD-46B0-98C0-318431C2BDF2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf2espi_firmware:73.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97A26020-0E69-43D9-8422-51802E70111C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf2espi_firmware:73.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "262725D9-6D98-41C7-827F-AE4FA29E779D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:st:st33tphf2espi:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "69A66F8A-B19E-42EC-9050-4EDD6810F6F9"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf2ei2c_firmware:73.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "208125BB-4384-410A-8694-1C55949BA585"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf2ei2c_firmware:73.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B31602FD-7B13-440F-9A8E-3B8CB560B129"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:st:st33tphf2ei2c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9236BB07-5AB5-4361-8632-500FF117FC8D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf20spi_firmware:74.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1A4B6FAF-F55B-48FC-8CF5-14416C696C20"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf20spi_firmware:74.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EECD04C3-257B-4269-B62F-6F4364BEBCD3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf20spi_firmware:74.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A5C09245-C219-4D4C-AECF-BFECB5BDAC9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf20spi_firmware:74.16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54267EB9-94CA-41D9-987C-0B310E620161"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:st:st33tphf20spi:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5AD1B922-F920-48CD-AD8A-8FFF07E7005C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf20i2c_firmware:74.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "305B9B97-8EFE-4666-82EF-3BA7059F3925"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:st:st33tphf20i2c_firmware:74.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23448585-9D09-44FB-B26E-A7074AE9B9C4"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:st:st33tphf20i2c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "66CEA512-EA0A-4E31-891B-27AC1E7B5E00"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://tpm.fail" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://support.f5.com/csp/article/K32412503?utm_source=f5support&%3Butm_medium=RSS" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03972en_us" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://support.lenovo.com/us/en/product_security/LEN-29406" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.st.com/content/st_com/en/campaigns/tpm-update.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
}
]
}