Your submission was sent successfully! Close

CVE-2020-12402

Published: 19 June 2020

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

Priority

Medium

CVSS 3 base score: 4.4

Status

Package Release Status
nss
Launchpad, Ubuntu, Debian
bionic
Released (2:3.35-2ubuntu2.9)
eoan
Released (2:3.45-1ubuntu2.4)
focal
Released (2:3.49.1-1ubuntu1.2)
precise
Released (2:3.28.4-0ubuntu0.12.04.9)
trusty
Released (2:3.28.4-0ubuntu0.14.04.5+esm6)
upstream
Released (3.53.1)
xenial
Released (2:3.28.4-0ubuntu0.16.04.12)