{ "id": "CVE-2020-11683", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-14T14:15:10.617", "lastModified": "2021-04-08T14:47:48.033", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A timing side channel was discovered in AT91bootstrap before 3.9.2. It can be exploited by attackers with physical access to forge CMAC values and subsequently boot arbitrary code on an affected system." }, { "lang": "es", "value": "Se detect\u00f3 un canal lateral de sincronizaci\u00f3n en AT91bootstrap versiones anteriores a 3.9.2. Puede ser explotado por atacantes con acceso f\u00edsico para falsificar valores CMAC y posteriormente iniciar c\u00f3digo arbitrario en un sistema afectado" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "PHYSICAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 0.9, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 4.6 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-203" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:linux4sam:at91bootstrap:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.7.2", "versionEndExcluding": "3.9.2", "matchCriteriaId": "DD93186D-51E5-4F8C-B833-D1931B06F370" } ] } ] } ], "references": [ { "url": "https://github.com/linux4sam/at91bootstrap/commit/7753914c9a622c245f3a3cf2af5e24b6a9904213", "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://labs.f-secure.com/advisories/microchip-at91bootstrap/", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] } ] }