Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Physical
0

CVE-2024-45678

Disclosure Date: September 03, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
4.2 Medium
Impact Score:
3.6
Exploitability Score:
0.5
Vector:
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector (AV):
Physical
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
None
Availability (A):
None

General Information

Vendors

  • yubico

Products

  • security key c nfc by yubico firmware,
  • security key nfc by yubico firmware,
  • yubihsm 2 fips firmware,
  • yubihsm 2 firmware,
  • yubikey 5 nano fips firmware,
  • yubikey 5 nano firmware,
  • yubikey 5 nfc fips firmware,
  • yubikey 5 nfc firmware,
  • yubikey 5c fips firmware,
  • yubikey 5c firmware,
  • yubikey 5c nano fips firmware,
  • yubikey 5c nano firmware,
  • yubikey 5c nfc fips firmware,
  • yubikey 5c nfc firmware,
  • yubikey 5ci fips firmware,
  • yubikey 5ci firmware,
  • yubikey bio firmware,
  • yubikey c bio firmware
Technical Analysis