The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 & Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface.
References
Link | Resource |
---|---|
https://eprint.iacr.org/2021/640 | Third Party Advisory |
https://github.com/solokeys/solo/commit/a9c02cd354f34b48195a342c7f524abdef5cbcec | Patch Third Party Advisory |
https://solokeys.com | Product |
https://twitter.com/SoloKeysSec | Product |
https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html | Third Party Advisory |
https://www.aisec.fraunhofer.de/en/FirmwareProtection.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2021-05-21 12:15
Updated : 2021-05-28 15:41
NVD link : CVE-2020-27208
Mitre link : CVE-2020-27208
CVE.ORG link : CVE-2020-27208
JSON object : View
Products Affected
solokeys
- somu_firmware
- solo_firmware
- somu
- solo
nitrokey
- fido2_firmware
- fido2
CWE
CWE-326
Inadequate Encryption Strength