P-384 and P-521 vulnerable to an electro-magnetic side channel attack on signature generation - CVE-2020-6829ID: oval:org.secpod.oval:def:65268 | Date: (C)2020-08-26 (M)2023-11-19 |
Class: VULNERABILITY | Family: macos |
Mozilla Firefox 80 : When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.15 |