STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://tpm.fail - Third Party Advisory | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024 - Third Party Advisory | |
References | () https://support.f5.com/csp/article/K32412503?utm_source=f5support&%3Butm_medium=RSS - | |
References | () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03972en_us - Third Party Advisory | |
References | () https://support.lenovo.com/us/en/product_security/LEN-29406 - Third Party Advisory | |
References | () https://www.st.com/content/st_com/en/campaigns/tpm-update.html - Vendor Advisory |
03 May 2022, 14:28
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 | |
CPE | cpe:2.3:h:st:st33tphf2espir28:-:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2espi_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2espiqfn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2espir28_firmware:*:*:*:*:*:*:*:* |
cpe:2.3:o:st:st33tphf2espi_firmware:71.12:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2ei2c_firmware:73.9:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2espi_firmware:71.4:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2espi_firmware:73.4:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf20spi_firmware:74.4:*:*:*:*:*:*:* cpe:2.3:h:st:st33tphf2ei2c:-:*:*:*:*:*:*:* cpe:2.3:h:st:st33tphf20spi:-:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf20i2c_firmware:74.5:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf20spi_firmware:74.16:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2espi_firmware:71.0:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2ei2c_firmware:73.5:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2espi_firmware:73.8:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf20spi_firmware:74.8:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf2espi_firmware:73.0:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf20spi_firmware:74.0:*:*:*:*:*:*:* cpe:2.3:h:st:st33tphf20i2c:-:*:*:*:*:*:*:* cpe:2.3:o:st:st33tphf20i2c_firmware:74.9:*:*:*:*:*:*:* |
References | (CONFIRM) https://support.lenovo.com/us/en/product_security/LEN-29406 - Third Party Advisory | |
References | (CONFIRM) https://www.st.com/content/st_com/en/campaigns/tpm-update.html - Vendor Advisory | |
References | (MISC) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024 - Third Party Advisory |
Information
Published : 2019-11-14 03:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-16863
Mitre link : CVE-2019-16863
CVE.ORG link : CVE-2019-16863
JSON object : View
Products Affected
st
- st33tphf20spi
- st33tphf2espi
- st33tphf20spi_firmware
- st33tphf20i2c
- st33tphf2ei2c
- st33tphf2ei2c_firmware
- st33tphf2espi_firmware
- st33tphf20i2c_firmware