CVE Published: 11/08/2020 |
CVE Updated: 04/08/2024 |
CVE Year: 2020 Source: Google |
Vendor: Google LLC |
Product: google/go-tpm library Status : PUBLISHED
CVE-2020-8918 Description
An improperly initialized \'migrationAuth\' value in Google\'s go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both \'encUsageAuth\' and \'encMigrationAuth\', and then can calculate \'usageAuth ^ encMigrationAuth\' as the \'migrationAuth\' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for \'migrationAuth\'.
Metrics
CVSS Version: 3.1 |
Base Score: 6.3 MEDIUM Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
l➤ Exploitability Metrics: Attack Vector (AV)* LOCAL Attack Complexity (AC)* HIGH Privileges Required (PR)* NONE User Interaction (UI)* REQUIRED Scope (S)* UNCHANGED
l➤ Impact Metrics: Confidentiality Impact (C)* HIGH Integrity Impact (I)* HIGH Availability Impact (A)* NONE
Weakness Enumeration (CWE)
CWE-ID: CWE-665 CWE Name: CWE-665 Improper Initialization Source: Google LLC
Common Attack Pattern Enumeration and Classification (CAPEC)