CVE-2020-10256

An issue was discovered in beta versions of the 1Password command-line tool prior to 0.5.5 and in beta versions of the 1Password SCIM bridge prior to 0.7.3. An insecure random number generator was used to generate various keys. An attacker with access to the user's encrypted data may be able to perform brute-force calculations of encryption keys and thus succeed at decryption.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:1password:command_line_interface:*:*:*:*:*:*:*:*
cpe:2.3:a:1password:scim:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () https://support.1password.com/command-line/ - Vendor Advisory () https://support.1password.com/command-line/ - Vendor Advisory
References () https://support.1password.com/kb/202010/ - Vendor Advisory () https://support.1password.com/kb/202010/ - Vendor Advisory
References () https://support.1password.com/scim/ - Vendor Advisory () https://support.1password.com/scim/ - Vendor Advisory

25 Mar 2024, 17:51

Type Values Removed Values Added
CPE cpe:2.3:a:1password:command-line:*:*:*:*:*:*:*:* cpe:2.3:a:1password:command_line_interface:*:*:*:*:*:*:*:*
First Time 1password command Line Interface

Information

Published : 2020-10-27 14:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10256

Mitre link : CVE-2020-10256

CVE.ORG link : CVE-2020-10256


JSON object : View

Products Affected

1password

  • scim
  • command_line_interface