CVE-2019-16863

STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:st:st33tphf2espi_firmware:71.0:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:71.4:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:71.12:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.0:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.4:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2espi_firmware:73.8:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf2espi:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:st:st33tphf2ei2c_firmware:73.5:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf2ei2c_firmware:73.9:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf2ei2c:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:st:st33tphf20spi_firmware:74.0:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.4:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.8:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20spi_firmware:74.16:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf20spi:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:st:st33tphf20i2c_firmware:74.5:*:*:*:*:*:*:*
cpe:2.3:o:st:st33tphf20i2c_firmware:74.9:*:*:*:*:*:*:*
cpe:2.3:h:st:st33tphf20i2c:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () http://tpm.fail - Third Party Advisory () http://tpm.fail - Third Party Advisory
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024 - Third Party Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190024 - Third Party Advisory
References () https://support.f5.com/csp/article/K32412503?utm_source=f5support&amp%3Butm_medium=RSS - () https://support.f5.com/csp/article/K32412503?utm_source=f5support&amp%3Butm_medium=RSS -
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03972en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03972en_us - Third Party Advisory
References () https://support.lenovo.com/us/en/product_security/LEN-29406 - Third Party Advisory () https://support.lenovo.com/us/en/product_security/LEN-29406 - Third Party Advisory
References () https://www.st.com/content/st_com/en/campaigns/tpm-update.html - Vendor Advisory () https://www.st.com/content/st_com/en/campaigns/tpm-update.html - Vendor Advisory

07 Nov 2023, 03:06

Type Values Removed Values Added
References
  • {'url': 'https://support.f5.com/csp/article/K32412503?utm_source=f5support&utm_medium=RSS', 'name': 'https://support.f5.com/csp/article/K32412503?utm_source=f5support&utm_medium=RSS', 'tags': ['Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://support.f5.com/csp/article/K32412503?utm_source=f5support&amp%3Butm_medium=RSS -

Information

Published : 2019-11-14 03:15

Updated : 2024-11-21 04:31


NVD link : CVE-2019-16863

Mitre link : CVE-2019-16863

CVE.ORG link : CVE-2019-16863


JSON object : View

Products Affected

st

  • st33tphf2espi_firmware
  • st33tphf2ei2c
  • st33tphf2espi
  • st33tphf20spi_firmware
  • st33tphf20spi
  • st33tphf20i2c
  • st33tphf20i2c_firmware
  • st33tphf2ei2c_firmware
CWE
CWE-203

Observable Discrepancy

CWE-327

Use of a Broken or Risky Cryptographic Algorithm