Products
Yubico YubiKey 5 Series devices
- before 5.7.0
YubiHSM 2 devices
- before 2.4.0
Source
cve@mitre.org
Tags
CVE-2024-45678 details
Published : Sept. 3, 2024, 8:15 p.m.
Last Modified : Sept. 3, 2024, 8:15 p.m.
Last Modified : Sept. 3, 2024, 8:15 p.m.
Description
Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
References
URL | Source |
---|---|
https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/ | cve@mitre.org |
https://news.ycombinator.com/item?id=41434500 | cve@mitre.org |
https://ninjalab.io/eucleak/ | cve@mitre.org |
https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf | cve@mitre.org |
https://support.yubico.com/hc/en-us/articles/15705749884444 | cve@mitre.org |
https://www.yubico.com/support/security-advisories/ysa-2024-03/ | cve@mitre.org |
This website uses the NVD API, but is not approved or certified by it.