CVE-2020-11684

critical

Description

AT91bootstrap before 3.9.2 does not properly wipe encryption and authentication keys from memory before passing control to a less privileged software component. This can be exploited to disclose these keys and subsequently encrypt and sign the next boot stage (such as the bootloader).

References

https://labs.f-secure.com/advisories/microchip-at91bootstrap/

https://github.com/linux4sam/at91bootstrap/commit/45419497309ffbf27c17ea7938499aca99168927

Details

Source: Mitre, NVD

Published: 2020-09-14

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical

EPSS

EPSS: 0.00172