2 results (0.007 seconds)

CVSS: 6.2EPSS: 0%CPEs: 4EXPL: 0

STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to obtain information on cryptographic secrets. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform. STMicroelectronics STSAFE-J versiones 1.1.4, J-SAFE3 1.2.5 y J-SIGN a veces permiten a atacantes obtener información sobre secretos criptográficos. • https://community.st.com/s/toparticles https://www.cert.ssi.gouv.fr/avis/CERTFR-2022-AVI-169 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 6.2EPSS: 0%CPEs: 4EXPL: 0

STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to abuse signature verification. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform. STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, y J-SIGN a veces permiten a atacantes abusar de la verificación de firmas. • https://community.st.com/s/toparticles https://www.cert.ssi.gouv.fr/avis/CERTFR-2022-AVI-169 • CWE-347: Improper Verification of Cryptographic Signature •