5.9
CVE-2019-16863
- EPSS 0.27%
- Published 14.11.2019 03:15:11
- Last modified 21.11.2024 04:31:13
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
Data is provided by the National Vulnerability Database (NVD)
St ≫ St33tphf2espi Firmware Version71.0
St ≫ St33tphf2espi Firmware Version71.4
St ≫ St33tphf2espi Firmware Version71.12
St ≫ St33tphf2espi Firmware Version73.0
St ≫ St33tphf2espi Firmware Version73.4
St ≫ St33tphf2espi Firmware Version73.8
St ≫ St33tphf2ei2c Firmware Version73.5
St ≫ St33tphf2ei2c Firmware Version73.9
St ≫ St33tphf20spi Firmware Version74.0
St ≫ St33tphf20spi Firmware Version74.4
St ≫ St33tphf20spi Firmware Version74.8
St ≫ St33tphf20spi Firmware Version74.16
St ≫ St33tphf20i2c Firmware Version74.5
St ≫ St33tphf20i2c Firmware Version74.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.27% | 0.497 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
CWE-203 Observable Discrepancy
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.