Firefox < 78 Use of a Broken or Risky Cryptographic Algorithm Vulnerability

Summary

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes.

Credit:

The information has been provided by Sohaib ul Hassan

The original article can be found at:https://www.mozilla.org/security/advisories/mfsa2020-24/


Details

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

 

Vulnerable Systems:

Firefox < 78

 

CVE Information:

CVE-2020-12402

 

Disclosure Timeline:
Published Date:7/9/2020

Categories: News