5.9

CVE-2020-20949

Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.

Data is provided by the National Vulnerability Database (NVD)
StStm32cubef0 Version-
StStm32cubef1 Version-
StStm32cubef2 Version-
StStm32cubef3 Version-
StStm32cubef4 Version-
StStm32cubef7 Version-
StStm32cubeg0 Version-
StStm32cubeg4 Version-
StStm32cubeh7 Version-
StStm32cubeide Version-
StStm32cubel0 Version-
StStm32cubel1 Version-
StStm32cubel4 Version-
StStm32cubel4+ Version-
StStm32cubel5 Version-
StStm32cubemonitor Version-
StStm32cubemp1 Version-
StStm32cubemx Version-
StStm32cubeprogrammer Version-
StStm32cubewb Version-
StStm32cubewl Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.28% 0.484
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.