CVE-2017-15361

Scores

EPSS

0.734medium73.4%
0%20%40%60%80%100%

Percentile: 73.4%

CVSS

5.9medium3.x
0246810

CVSS Score: 5.9/10

All CVSS Scores

CVSS 3.x
5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Description

The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

Related Vulnerabilities

Exploits

Exploit ID: CVE-2017-15361

Source: github-poc

URL: https://github.com/Elbarbons/ROCA-attack-on-vulnerability-CVE-2017-15361

Vulnerable Software (2)

Type: Configuration

Vendor: *

Product: rsa_library

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:infineon:rsa_library:*:*:*:*:*:*:*:*",      "versionEndIncluding": "1.02.013",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: trusted_platform_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:infineon:trusted_platform_firmware:4.31:*:*:*:*:*:*:*",          "vulnerable": true        },        {      ...

Source: nvd

End of list