The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 & Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface.
References
Link | Resource |
---|---|
https://eprint.iacr.org/2021/640 | Third Party Advisory |
https://github.com/solokeys/solo/commit/a9c02cd354f34b48195a342c7f524abdef5cbcec | Patch Third Party Advisory |
https://solokeys.com | Product |
https://twitter.com/SoloKeysSec | Product |
https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html | Third Party Advisory |
https://www.aisec.fraunhofer.de/en/FirmwareProtection.html | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-05-21T11:17:50
Updated: 2021-05-26T15:04:34
Reserved: 2020-10-19T00:00:00
Link: CVE-2020-27208
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-21T12:15:07.663
Modified: 2021-05-28T15:41:32.837
Link: CVE-2020-27208
JSON object: View
Redhat Information
No data.
CWE