Vulnerability Details : CVE-2020-36315
In RELIC before 2020-08-01, RSA PKCS#1 v1.5 signature forgery can occur because certain checks of the padding (and of the first two bytes) are inadequate. NOTE: this requires that a low public exponent (such as 3) is being used. The product, by default, does not generate RSA keys with such a low number.
Products affected by CVE-2020-36315
- cpe:2.3:a:relic_project:relic:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36315
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36315
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2020-36315
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-36315
-
https://github.com/relic-toolkit/relic/commit/76c9a1fdf19d9e92e566a77376673e522aae9f80
Fix #154 and #155 by inverting the padding check logic and being more… · relic-toolkit/relic@76c9a1f · GitHubPatch;Third Party Advisory
-
https://github.com/relic-toolkit/relic/issues/154
PKCS1v1.5 implementation and Bleichenbacher-style small exponent signature forgery · Issue #154 · relic-toolkit/relic · GitHubExploit;Third Party Advisory
-
https://github.com/relic-toolkit/relic/tree/32eb4c257fc80328061d66639b1cdb35dbed51a2
GitHub - relic-toolkit/relic at 32eb4c257fc80328061d66639b1cdb35dbed51a2Third Party Advisory
-
https://github.com/relic-toolkit/relic/
GitHub - relic-toolkit/relic: CodeThird Party Advisory
Jump to