ID

VAR-202409-0398


CVE

CVE-2024-45678


TITLE

plural  Yubico  Observable inconsistency vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2024-007966

DESCRIPTION

Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected. yubikey 5c nfc firmware, YubiKey 5 NFC firmware, yubikey 5c firmware etc. Yubico The product contains an observable inconsistency vulnerability.Information may be obtained

Trust: 1.62

sources: NVD: CVE-2024-45678 // JVNDB: JVNDB-2024-007966

AFFECTED PRODUCTS

vendor:yubicomodel:yubikey c bioscope:ltversion:5.7.2

Trust: 1.0

vendor:yubicomodel:yubihsm 2scope:ltversion:2.4.0

Trust: 1.0

vendor:yubicomodel:yubikey 5 nfcscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5c fipsscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:security key c nfc by yubicoscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5ci fipsscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:security key nfc by yubicoscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5cscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5c nfcscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey bioscope:ltversion:5.7.2

Trust: 1.0

vendor:yubicomodel:yubikey 5ciscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5 nanoscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5 nano fipsscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5c nfc fipsscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5c nanoscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey 5 nfc fipsscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubihsm 2 fipsscope:ltversion:2.4.0

Trust: 1.0

vendor:yubicomodel:yubikey 5c nano fipsscope:ltversion:5.7

Trust: 1.0

vendor:yubicomodel:yubikey bioscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5 nano fipsscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5c nfcscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5cscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5c nano fipsscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5 nfc fipsscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubihsm 2 fipsscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5ci fipsscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5ciscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5c fipsscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5 nfcscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey c bioscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5 nanoscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubihsm 2scope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5c nanoscope: - version: -

Trust: 0.8

vendor:yubicomodel:security key nfc by yubicoscope: - version: -

Trust: 0.8

vendor:yubicomodel:security key c nfc by yubicoscope: - version: -

Trust: 0.8

vendor:yubicomodel:yubikey 5c nfc fipsscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2024-007966 // NVD: CVE-2024-45678

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-45678
value: MEDIUM

Trust: 1.0

NVD: CVE-2024-45678
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2024-45678
baseSeverity: MEDIUM
baseScore: 4.2
vectorString: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.5
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2024-45678
baseSeverity: MEDIUM
baseScore: 4.2
vectorString: CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2024-007966 // NVD: CVE-2024-45678

PROBLEMTYPE DATA

problemtype:CWE-203

Trust: 1.0

problemtype:Observable discrepancy (CWE-203) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-007966 // NVD: CVE-2024-45678

EXTERNAL IDS

db:NVDid:CVE-2024-45678

Trust: 2.6

db:JVNDBid:JVNDB-2024-007966

Trust: 0.8

sources: JVNDB: JVNDB-2024-007966 // NVD: CVE-2024-45678

REFERENCES

url:https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/

Trust: 1.8

url:https://news.ycombinator.com/item?id=41434500

Trust: 1.8

url:https://ninjalab.io/eucleak/

Trust: 1.8

url:https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf

Trust: 1.8

url:https://support.yubico.com/hc/en-us/articles/15705749884444

Trust: 1.8

url:https://www.yubico.com/support/security-advisories/ysa-2024-03/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-45678

Trust: 0.8

sources: JVNDB: JVNDB-2024-007966 // NVD: CVE-2024-45678

SOURCES

db:JVNDBid:JVNDB-2024-007966
db:NVDid:CVE-2024-45678

LAST UPDATE DATE

2024-09-15T22:59:38.038000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2024-007966date:2024-09-13T02:48:00
db:NVDid:CVE-2024-45678date:2024-09-12T20:07:09.640

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2024-007966date:2024-09-13T00:00:00
db:NVDid:CVE-2024-45678date:2024-09-03T20:15:08.860