CVE-2019-16863

STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:st:st33tphf2espi_firmware:71.0:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:71.4:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:71.12:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.0:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.4:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.8:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf2espi:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:st:st33tphf2ei2c_firmware:73.5:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2ei2c_firmware:73.9:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf2ei2c:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:st:st33tphf20spi_firmware:74.0:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.4:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.8:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.16:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf20spi:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:st:st33tphf20i2c_firmware:74.5:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20i2c_firmware:74.9:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf20i2c:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () http://tpm.fail - Third Party Advisory () http://tpm.fail - Third Party Advisory
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024 - Third Party Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024 - Third Party Advisory
References () https://support.f5.com/csp/article/K32412503?utm_source=f5support&amp%3Butm_medium=RSS - () https://support.f5.com/csp/article/K32412503?utm_source=f5support&amp%3Butm_medium=RSS -
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03972en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03972en_us - Third Party Advisory
References () https://support.lenovo.com/us/en/product_security/LEN-29406 - Third Party Advisory () https://support.lenovo.com/us/en/product_security/LEN-29406 - Third Party Advisory
References () https://www.st.com/content/st_com/en/campaigns/tpm-update.html - Vendor Advisory () https://www.st.com/content/st_com/en/campaigns/tpm-update.html - Vendor Advisory

03 May 2022, 14:28

Type Values Removed Values Added
CWE CWE-203
CPE cpe:2.3:h:st:st33tphf2espiqfn:-:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf2espir28:-:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espiqfn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espir28_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:71.12:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2ei2c_firmware:73.9:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:71.4:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.4:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.4:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf2ei2c:-:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf20spi:-:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20i2c_firmware:74.5:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.16:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:71.0:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2ei2c_firmware:73.5:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.8:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.8:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.0:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.0:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf20i2c:-:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20i2c_firmware:74.9:*:*:*:*:*:*:*
References (CONFIRM) https://support.lenovo.com/us/en/product_security/LEN-29406 - (CONFIRM) https://support.lenovo.com/us/en/product_security/LEN-29406 - Third Party Advisory
References (CONFIRM) https://www.st.com/content/st_com/en/campaigns/tpm-update.html - (CONFIRM) https://www.st.com/content/st_com/en/campaigns/tpm-update.html - Vendor Advisory
References (MISC) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024 - (MISC) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024 - Third Party Advisory

Information

Published : 2019-11-14 03:15

Updated : 2024-11-21 04:31


NVD link : CVE-2019-16863

Mitre link : CVE-2019-16863

CVE.ORG link : CVE-2019-16863


JSON object : View

Products Affected

st

  • st33tphf20spi
  • st33tphf2espi
  • st33tphf20spi_firmware
  • st33tphf20i2c
  • st33tphf2ei2c
  • st33tphf2ei2c_firmware
  • st33tphf2espi_firmware
  • st33tphf20i2c_firmware
CWE
CWE-203

Observable Discrepancy

CWE-327

Use of a Broken or Risky Cryptographic Algorithm