Vulnerabilites related to yubico - yubikey_5_nfc_firmware
CVE-2020-15001 (GCVE-0-2020-15001)
Vulnerability from cvelistv5
Published
2020-07-09 18:05
Modified
2024-08-04 13:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when updating NFC specific components of the OTP configurations. This may allow an attacker to access configured OTPs and passwords stored in slots that were not configured by the user to be read over NFC, despite a user having set an access code. (Users who have not set an access code, or who have not configured the OTP slots, are not impacted by this issue.)
References
▼ | URL | Tags |
---|---|---|
https://www.yubico.com/support/security-advisories/ysa-2020-04/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:00:52.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2020-04/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when updating NFC specific components of the OTP configurations. This may allow an attacker to access configured OTPs and passwords stored in slots that were not configured by the user to be read over NFC, despite a user having set an access code. (Users who have not set an access code, or who have not configured the OTP slots, are not impacted by this issue.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-09T18:05:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2020-04/" } ], "source": { "discovery": "INTERNAL" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when updating NFC specific components of the OTP configurations. This may allow an attacker to access configured OTPs and passwords stored in slots that were not configured by the user to be read over NFC, despite a user having set an access code. (Users who have not set an access code, or who have not configured the OTP slots, are not impacted by this issue.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.yubico.com/support/security-advisories/ysa-2020-04/", "refsource": "CONFIRM", "url": "https://www.yubico.com/support/security-advisories/ysa-2020-04/" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-15001", "datePublished": "2020-07-09T18:05:30", "dateReserved": "2020-06-23T00:00:00", "dateUpdated": "2024-08-04T13:00:52.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45678 (GCVE-0-2024-45678)
Vulnerability from cvelistv5
Published
2024-09-03 00:00
Modified
2025-03-17 17:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-45678", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T20:05:11.700572Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203 Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-17T17:51:54.621Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:30:53.719Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.yubico.com/support/security-advisories/ysa-2024-03/" }, { "url": "https://support.yubico.com/hc/en-us/articles/15705749884444" }, { "url": "https://ninjalab.io/eucleak/" }, { "url": "https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf" }, { "url": "https://news.ycombinator.com/item?id=41434500" }, { "url": "https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-45678", "datePublished": "2024-09-03T00:00:00.000Z", "dateReserved": "2024-09-03T00:00:00.000Z", "dateUpdated": "2025-03-17T17:51:54.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-15000 (GCVE-0-2020-15000)
Vulnerability from cvelistv5
Published
2020-07-09 17:57
Modified
2024-08-04 13:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A PIN management problem was discovered on Yubico YubiKey 5 devices 5.2.0 to 5.2.6. OpenPGP has three passwords: Admin PIN, Reset Code, and User PIN. The Reset Code is used to reset the User PIN, but it is disabled by default. A flaw in the implementation of OpenPGP sets the Reset Code to a known value upon initialization. If the retry counter for the Reset Code is set to non-zero without changing the Reset Code, this known value can be used to reset the User PIN. To set the retry counters, the Admin PIN is required.
References
▼ | URL | Tags |
---|---|---|
https://www.yubico.com/support/security-advisories/ysa-2020-05/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:00:52.122Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2020-05/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A PIN management problem was discovered on Yubico YubiKey 5 devices 5.2.0 to 5.2.6. OpenPGP has three passwords: Admin PIN, Reset Code, and User PIN. The Reset Code is used to reset the User PIN, but it is disabled by default. A flaw in the implementation of OpenPGP sets the Reset Code to a known value upon initialization. If the retry counter for the Reset Code is set to non-zero without changing the Reset Code, this known value can be used to reset the User PIN. To set the retry counters, the Admin PIN is required." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-09T17:57:40", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2020-05/" } ], "source": { "discovery": "INTERNAL" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A PIN management problem was discovered on Yubico YubiKey 5 devices 5.2.0 to 5.2.6. OpenPGP has three passwords: Admin PIN, Reset Code, and User PIN. The Reset Code is used to reset the User PIN, but it is disabled by default. A flaw in the implementation of OpenPGP sets the Reset Code to a known value upon initialization. If the retry counter for the Reset Code is set to non-zero without changing the Reset Code, this known value can be used to reset the User PIN. To set the retry counters, the Admin PIN is required." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.yubico.com/support/security-advisories/ysa-2020-05/", "refsource": "CONFIRM", "url": "https://www.yubico.com/support/security-advisories/ysa-2020-05/" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-15000", "datePublished": "2020-07-09T17:57:40", "dateReserved": "2020-06-23T00:00:00", "dateUpdated": "2024-08-04T13:00:52.122Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-07-09 19:15
Modified
2024-11-21 05:04
Severity ?
Summary
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when updating NFC specific components of the OTP configurations. This may allow an attacker to access configured OTPs and passwords stored in slots that were not configured by the user to be read over NFC, despite a user having set an access code. (Users who have not set an access code, or who have not configured the OTP slots, are not impacted by this issue.)
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.yubico.com/support/security-advisories/ysa-2020-04/ | Exploit, Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.yubico.com/support/security-advisories/ysa-2020-04/ | Exploit, Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yubico | yubikey_5_nfc_firmware | * | |
yubico | yubikey_5_nfc_firmware | * | |
yubico | yubikey_5_nfc | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5_nfc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FC63B85-292F-47E0-8F6B-B937CDBDC6DF", "versionEndIncluding": "5.2.6", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:yubico:yubikey_5_nfc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2514912-868E-4C6E-93DE-1527D88560BB", "versionEndIncluding": "5.3.1", "versionStartIncluding": "5.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5_nfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A090DE-CB10-4B10-AAED-8FD0FF8587EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when updating NFC specific components of the OTP configurations. This may allow an attacker to access configured OTPs and passwords stored in slots that were not configured by the user to be read over NFC, despite a user having set an access code. (Users who have not set an access code, or who have not configured the OTP slots, are not impacted by this issue.)" }, { "lang": "es", "value": "Se detect\u00f3 una fuga de informaci\u00f3n en los dispositivos Yubico YubiKey 5 NFC versiones 5.0.0 hasta 5.2.6 y 5.3.0 hasta 5.3.1. La aplicaci\u00f3n OTP permite al usuario establecer c\u00f3digos de acceso opcionales en los slots OTP. Este c\u00f3digo de acceso est\u00e1 destinado a impedir cambios no autorizados en las configuraciones de OTP. El c\u00f3digo de acceso no es comprobado al actualizar componentes espec\u00edficos de NFC de las configuraciones de OTP. Esto puede permitir a un atacante acceder a las OTP configuradas y contrase\u00f1as almacenadas en slots que el usuario no configur\u00f3 para que se lean a trav\u00e9s de NFC, a pesar de que un usuario haya establecido un c\u00f3digo de acceso. (Los usuarios que no han establecido un c\u00f3digo de acceso, o que no han configurado las slots OTP, no est\u00e1n afectados por este problema)" } ], "id": "CVE-2020-15001", "lastModified": "2024-11-21T05:04:36.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-09T19:15:11.057", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2020-04/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2020-04/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-09 18:15
Modified
2024-11-21 05:04
Severity ?
Summary
A PIN management problem was discovered on Yubico YubiKey 5 devices 5.2.0 to 5.2.6. OpenPGP has three passwords: Admin PIN, Reset Code, and User PIN. The Reset Code is used to reset the User PIN, but it is disabled by default. A flaw in the implementation of OpenPGP sets the Reset Code to a known value upon initialization. If the retry counter for the Reset Code is set to non-zero without changing the Reset Code, this known value can be used to reset the User PIN. To set the retry counters, the Admin PIN is required.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.yubico.com/support/security-advisories/ysa-2020-05/ | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.yubico.com/support/security-advisories/ysa-2020-05/ | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yubico | yubikey_5_nfc_firmware | * | |
yubico | yubikey_5_nfc | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5_nfc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB09F4B-315D-4F2A-8505-C7D5B88E0CBA", "versionEndIncluding": "5.2.6", "versionStartIncluding": "5.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5_nfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A090DE-CB10-4B10-AAED-8FD0FF8587EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A PIN management problem was discovered on Yubico YubiKey 5 devices 5.2.0 to 5.2.6. OpenPGP has three passwords: Admin PIN, Reset Code, and User PIN. The Reset Code is used to reset the User PIN, but it is disabled by default. A flaw in the implementation of OpenPGP sets the Reset Code to a known value upon initialization. If the retry counter for the Reset Code is set to non-zero without changing the Reset Code, this known value can be used to reset the User PIN. To set the retry counters, the Admin PIN is required." }, { "lang": "es", "value": "Se detect\u00f3 un problema de administraci\u00f3n de PIN en los dispositivos Yubico YubiKey versiones 5 5.2.0 hasta 5.2.6. OpenPGP tiene tres contrase\u00f1as: el PIN de administrador, el C\u00f3digo de Restablecimiento y el PIN de usuario. El c\u00f3digo de restablecimiento se usa para restablecer el PIN de usuario, pero est\u00e1 deshabilitado por defecto. Un fallo en la implementaci\u00f3n de OpenPGP establece el c\u00f3digo de restablecimiento en un valor conocido tras la inicializaci\u00f3n. Si el contador de reintentos para el C\u00f3digo de Reinicio se establece en un valor distinto de cero sin cambiar el C\u00f3digo de Reinicio, este valor conocido se puede usar para reiniciar el PIN del usuario. Para configurar los contadores de reintento, es requerido el PIN de administrador" } ], "id": "CVE-2020-15000", "lastModified": "2024-11-21T05:04:35.887", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-09T18:15:10.927", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2020-05/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2020-05/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-03 20:15
Modified
2025-03-17 18:15
Severity ?
4.2 (Medium) - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
4.2 (Medium) - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
4.2 (Medium) - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/ | Press/Media Coverage | |
cve@mitre.org | https://news.ycombinator.com/item?id=41434500 | Issue Tracking | |
cve@mitre.org | https://ninjalab.io/eucleak/ | Third Party Advisory | |
cve@mitre.org | https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf | Technical Description | |
cve@mitre.org | https://support.yubico.com/hc/en-us/articles/15705749884444 | Mitigation, Third Party Advisory | |
cve@mitre.org | https://www.yubico.com/support/security-advisories/ysa-2024-03/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5c_nfc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A3AD0E6-0574-47EE-9FBB-334CE68DDC21", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5c_nfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "07C25D85-7064-40AE-8367-E0177ABF34BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5_nfc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "579B4B53-42E6-49F4-8B6A-CEF20F4FB273", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5_nfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A090DE-CB10-4B10-AAED-8FD0FF8587EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "105FC95D-FFF9-4B62-A3C8-885CA849594F", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5c:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D171D5-5D3B-466C-B94A-2918B366FBBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5_nano_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF1F17EC-56C2-4D7A-A9C9-40FEF40230F0", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5_nano:-:*:*:*:*:*:*:*", "matchCriteriaId": "40CB7E26-B259-4598-A315-99BA9FAEF597", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5c_nano_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFCF2D75-F0AD-46EF-8FA6-584D063AB617", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5c_nano:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8FCB422-72F5-41C6-8D1C-862F89EE7BB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5ci_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13D52DA5-40EB-459B-89DB-8340633CE912", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5ci:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E8E34BD-9EC0-44A1-8FAF-6B03A489EE63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5_nfc_fips_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07334305-916C-43BF-A1EC-99555AD648E4", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5_nfc_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "431D25BC-EBE5-48EC-9CC3-7CD93C9E1AD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5c_nfc_fips_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36B8E1DF-54D0-4EF5-AD7F-FE06BD40DD45", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5c_nfc_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DB4CEA3-0317-40DB-89A5-017FA4934936", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5c_fips_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B9F6B35-DD39-47E6-9960-214A6992EB91", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5c_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5986774-1168-4212-94DA-F9095800203E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5_nano_fips_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B2E277E-94B9-465C-8A8D-A4838B8C13E5", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5_nano_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "A805BFB3-B3C1-4CCF-A71D-87F81DC3C0DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5c_nano_fips_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A85128D8-4149-438B-BB18-8D1F72DE3DEB", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5c_nano_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6261B0-E797-4A6F-9AB6-557E6ACFF994", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_5ci_fips_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C61C9EED-7B06-4636-A59D-444A873C1362", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_5ci_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC63DF4C-FF60-47FE-9495-A8566AC8B5FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_c_bio_firmware:*:*:*:*:fido:*:*:*", "matchCriteriaId": "D605684E-D163-4492-AB15-01E867A6CD8B", "versionEndExcluding": "5.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_c_bio:-:*:*:*:fido:*:*:*", "matchCriteriaId": "F9898BB1-A204-432B-849A-53A662757129", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubikey_bio_firmware:*:*:*:*:fido:*:*:*", "matchCriteriaId": "4AB8EF7A-D87A-4D22-AEB4-8911DD494BA6", "versionEndExcluding": "5.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubikey_bio:-:*:*:*:fido:*:*:*", "matchCriteriaId": "9FE20969-040C-4128-B57E-EAB586404981", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:security_key_nfc_by_yubico_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B027D4D5-44BB-4A43-8C45-8205B29F0ABC", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:security_key_nfc_by_yubico:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0AD2F8-BD3C-4FDD-BFEF-7E2620E56A5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:security_key_c_nfc_by_yubico_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE823686-6D37-44F2-AB74-8888454E4DEB", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:security_key_c_nfc_by_yubico:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD5C316F-E25C-49A3-9C9F-BA098D1C408C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubihsm_2_fips_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AB6A24D-F4C0-444B-BF88-9C6BCD8E3F63", "versionEndExcluding": "2.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubihsm_2_fips:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "424BAB98-3166-4977-BBF4-50B412BBB1F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yubico:yubihsm_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FF84FB6-7A33-4C1A-9212-17F84C61DA85", "versionEndExcluding": "2.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yubico:yubihsm_2:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1D146-4B00-4920-AC77-893AF88E249D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected." }, { "lang": "es", "value": "Los dispositivos Yubico YubiKey 5 Series con firmware anterior a la versi\u00f3n 5.7.0 y los dispositivos YubiHSM 2 con firmware anterior a la versi\u00f3n 2.4.0 permiten un ataque de extracci\u00f3n de clave secreta ECDSA (que requiere acceso f\u00edsico y equipo costoso) en el que est\u00e1 presente un canal lateral electromagn\u00e9tico debido a una inversi\u00f3n modular de tiempo no constante para el algoritmo euclidiano extendido, tambi\u00e9n conocido como el problema EUCLEAK. Tambi\u00e9n pueden verse afectados otros usos de una librer\u00eda criptogr\u00e1fica de Infineon." } ], "id": "CVE-2024-45678", "lastModified": "2025-03-17T18:15:18.033", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-09-03T20:15:08.860", "references": [ { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage" ], "url": "https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=41434500" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://ninjalab.io/eucleak/" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf" }, { "source": "cve@mitre.org", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://support.yubico.com/hc/en-us/articles/15705749884444" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.yubico.com/support/security-advisories/ysa-2024-03/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }