Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2020-36478

Disclosure Date: August 23, 2021
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
3.6
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
High
Availability (A):
None

General Information

Vendors

  • arm,
  • debian,
  • siemens

Products

  • debian linux 10.0,
  • debian linux 9.0,
  • logo! cmr2020 firmware,
  • logo! cmr2040 firmware,
  • mbed tls,
  • simatic rtu3000c firmware,
  • simatic rtu3030c firmware,
  • simatic rtu3031c firmware,
  • simatic rtu3041c firmware
Technical Analysis