CVE-2020-27208
Severity CVSS v4.0:
Pending analysis
Type:
CWE-326
Inadequate Encryption Strength
Publication date:
21/05/2021
Last modified:
28/05/2021
Description
The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 & Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:solokeys:solo_firmware:4.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:solokeys:solo:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:solokeys:somu_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:solokeys:somu:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:nitrokey:fido2_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:nitrokey:fido2:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://eprint.iacr.org/2021/640
- https://github.com/solokeys/solo/commit/a9c02cd354f34b48195a342c7f524abdef5cbcec
- https://solokeys.com
- https://twitter.com/SoloKeysSec
- https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html
- https://www.aisec.fraunhofer.de/en/FirmwareProtection.html



