Overview
The Infineon RSA library version 1.02.013 does not properly generate RSA key pairs, which may allow an attacker to recover the RSA private key corresponding to an RSA public key generated by this library. This vulnerability is often cited as "ROCA" in the media.
Description
CWE-310: Cryptographic Issues - CVE-2017-15361 The Infineon RSA library version 1.02.013 does not properly generate RSA key pairs. As a result, the keyspace required for a brute force search is lessened such that it is feasible to factorize keys under at least 2048 bits and obtain the RSA private key. The attacker needs only access to the victim's RSA public key generated by this library in order to calculate the private key. |
Impact
A remote attacker may be able recover the RSA private key from a victim's public key, if it was generated by the Infineon RSA library. |
Solution
Apply an update |
Replace the device |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 8.8 | AV:N/AC:M/Au:N/C:C/I:C/A:N |
Temporal | 6.9 | E:POC/RL:OF/RC:C |
Environmental | 6.9 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- https://crocs.fi.muni.cz/public/papers/rsa_ccs17
- https://crocs.fi.muni.cz/_media/public/papers/nemec_roca_ccs17_preprint.pdf
- https://github.com/crocs-muni/roca
- https://www.infineon.com/cms/en/product/promopages/tpm-update/?redirId=59160
- https://blog.cr.yp.to/20171105-infineon.html
- http://cwe.mitre.org/data/definitions/310.html
Acknowledgements
This vulnerability was disclosed by Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, and Vashek Matyas.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2017-15361 |
Date Public: | 2017-10-16 |
Date First Published: | 2017-10-16 |
Date Last Updated: | 2017-11-08 20:44 UTC |
Document Revision: | 61 |