5.9
CVSSv3

CVE-2017-15361

Published: 16/10/2017 Updated: 03/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 387
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions prior to 0000000000000422 - 4.34, prior to 000000000000062b - 6.43, and prior to 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for malicious users to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (prior to 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

infineon trusted_platform_firmware 6.40

infineon trusted_platform_firmware 133.32

infineon trusted_platform_firmware 4.31

infineon trusted_platform_firmware 4.32

infineon rsa library

Vendor Advisories

A potential security vulnerability known as “ROCA: Vulnerable RSA Generation” has been identified with the RSA keys generated by the HP Trusted Platform Module (TPM) Accessory and printers equipped with a TPM This vulnerability could potentially be exploited remotely to allow remote disclosure of information ...
A security vulnerability was identified in the RSA key generation method used by TPM products listed below This leaves the keys potentially vulnerable via targeted, computationally expensive attacks These RSA keys generated by the TPM are used with certain software products and should not be considered secure Updated TPM firmware versions which ...
A security vulnerability was identified in the RSA key generation method used by TPM products listed below This leaves the keys potentially vulnerable via targeted, computationally expensive attacks These RSA keys generated by the TPM are used with certain software products and should not be considered secure Updated TPM firmware versions which ...

Github Repositories

$2 hardware SSH keys storage

CedarKey Security Kit Secure SSH Key Storage This project is mostly intended to protect from "software" (trojans, etc) extraction of ssh key and to provide more reliable method of storing keys than just keeping them on disk storage It might not be as protected as smartcard against all physical attacks, however in some cases, it is more protected as it's transpa

Simple PowerShell script to check whether a computer is using an Infineon TPM chip that is vulnerable to CVE-2017-15361.

Infineon-CVE-2017-15361 Simple PowerShell script to check whether a computer is using an Infineon TPM chip that is vulnerable to CVE-2017-15361 IMPORTANT: THIS MUST BE EXECUTED AS ADMINISTRATOR!! This script only works on Windows 81 and Windows Server 2012 or later releases of Windows The script was reused from Microsoft: portalmsrcmicrosoftcom/en-US/security-gu

Bro plugin to check if certificates are affected by CVE-2017-15361

Johanna::ROCA This plugin implements detection of CVE-2017-15361 keys; it is a reimplementation of the source available at githubcom/crocs-muni/roca This plugin provides two new BIFs that can check public keys: roca_vulnerable_cert checks if a certificate is vulnerable roca_vulnerable_mod checks if a modulus is vulerable This plugin also ships with a script that is

Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.

Project Paranoid Overview Paranoid project checks for well known weaknesses on cryptographic artifacts such as public keys, digital signatures and general pseudorandom numbers This library contains implementations and optimizations of existing work found in the literature The existing work showed that the generation of these artifacts was flawed in some cases The following

Windows tool that analyzes your computer for Infineon TPM weak RSA keys (CVE-2017-15361)

RocaCmTest Windows tool that analyzes your TPM and certificates for Infineon weak RSA keys (CVE-2017-15361) The tool is directly inspired by this GitHub project (githubcom/crocs-muni/roca) and uses its detection logic This project just represents a more user-friendly and comprehensive version of detecting the vulnerability It re-uses and expands the project structure

Analysis of the update of TPM firmware

Analysis of the update of TPM firmware What is it about? TPM (Trusted Platform Module) devices have many features and contain sensitive information They can be used to store private keys, encrypt hard drives, attest that the boot went without unexpected components, etc Sometimes, vulnerabilities occur, such as ROCA (CVE-2017-15361, crocsfimunicz/public/papers/rsa_

Bro plugin to check if certificates are affected by CVE-2017-15361

Johanna::ROCA This plugin implements detection of CVE-2017-15361 keys; it is a reimplementation of the source available at githubcom/crocs-muni/roca This plugin provides two new BIFs that can check public keys: roca_vulnerable_cert checks if a certificate is vulnerable roca_vulnerable_mod checks if a modulus is vulerable This plugin also ships with a script that is

Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber

Detect Trusted Platform Modules Vulnerable to CVE-2017-15361 This repository provides content for aiding DoD administrators in detecting systems that have an enabled Trusted Platform Module (TPM) that is vulnerable to CVE-2017-15361 and is a companion to Information Assurance Advisory RSA Key Generation Vulnerability Affecting Trusted Platform Modules The files in this reposit

ROCA attack on vulnerability CVE-2017-15361

ROCA-attack-on-vulnerability-CVE-2017-15361 This repository contains the thesis developed for my bachelor's degree in Mathematical Engineering at Polytechnic of Turin It's a script based on python and sage The goal of the script is to generate an RSA key, evaluete if it's vulnerable by the ROCA attack and performe the ROCA attack Comments in the scripts are in

ROCA attack on vulnerability CVE-2017-15361

ROCA-attack-on-vulnerability-CVE-2017-15361 This repository contains the thesis developed for my bachelor's degree in Mathematical Engineering at Polytechnic of Turin It's a script based on python and sage The goal of the script is to generate an RSA key, evaluete if it's vulnerable by the ROCA attack and performe the ROCA attack Comments in the scripts are in

WMCTF 2023_OFFICAL_WRITE-UP_CN [TOC] WEB ez_java_again Imagefile?url1=file:///%25%36%36%25%36%63%25%36%31%25%36%37%23java AnyFileRead /admin///////////////flag ezblog two tricks, one is db trick, the other is pm2 trick Intended solution Attachement given TypeScript source code。 The comment in TypeScript about /post/:id/edit is misleading,The parameter type

Go package that checks if RSA keys are vulnerable to ROCA / CVE-2017-15361

rocacheck Package rocacheck is a Go implementation of the key fingerprint algorithm that checks if an RSA key was generated by broken Infineon code and is vulnerable to factorization via the Return of Coppersmith's Attack (ROCA) / CVE-2017-15361

Implementation of the ROCA attack

Implementation of the ROCA attack (CVE-2017-15361) This is the implementation of the paper Return of the Coppersmith attack The implementation is in python 27 and uses the Howgrave-Graham code from RSA-and-LLL-attacks For the detection of vulnerable keys, the code from the original authors of the paper is used (detectpy) crocs-muni PR's welcome! Usage $ python rocapy

Recent Articles

ROCA 'round the lock: Gemalto says IDPrime .NET access cards bitten by TPM RSA key gremlin
The Register • John Leyden • 23 Oct 2017

Here's what to do if you have an affected badge

Some Gemalto smartcards can be potentially cloned and used by highly skilled crooks due to a cryptography blunder dubbed ROCA. Security researchers went public last week with research that revealed that RSA keys produced for smartcards, security tokens, and other devices by crypto-chips made by Infineon Technologies were weak and crackable. In other words, the private half of the RSA public-private key pairs in the gadgets, which are supposed to be secret, can be calculated from the public half,...

Never mind the WPA2 drama... Details emerge of TPM key cockup that hits tonnes of devices
The Register • John Leyden • 16 Oct 2017

About a third of all crypto modules globally generate weak, crackable RSA pairs

RSA keys produced by smartcards, security tokens, laptops, and other devices using cryptography chips made by Infineon Technologies are weak and crackable – and should be regenerated with stronger algorithms. In short, Infineon TPMs – aka trusted platform modules – are used in countless computers and gadgets to generate RSA key pairs for securing VPNs, implementing trusted boot sequences, performing whole disk encryption, granting access to cloud accounts, producing encryption certificates...

References

NVD-CWE-noinfohttps://www.infineon.com/cms/en/product/promopages/tpm-update/?redirId=59160https://sites.google.com/a/chromium.org/dev/chromium-os/tpm_firmware_updatehttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170012https://crocs.fi.muni.cz/public/papers/rsa_ccs17https://arstechnica.com/information-technology/2017/10/crypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids/https://www.yubico.com/support/security-advisories/ysa-2017-01/https://dan.enigmabridge.com/roca-vulnerability-impact-on-gemalto-idprime-net-smart-cards/http://support.lenovo.com/us/en/product_security/LEN-15552https://github.com/iadgov/Detect-CVE-2017-15361-TPMhttp://www.securityfocus.com/bid/101484https://www.kb.cert.org/vuls/id/307015https://monitor.certipath.com/rsatesthttps://keychest.net/rocahttps://github.com/crocs-muni/rocahttps://security.netapp.com/advisory/ntap-20171024-0001/https://blog.cr.yp.to/20171105-infineon.htmlhttps://ics-cert.us-cert.gov/advisories/ICSA-18-058-01https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03801en_ushttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03789en_ushttps://cert-portal.siemens.com/productcert/pdf/ssa-470231.pdfhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00148.htmlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00104.htmlhttps://nvd.nist.govhttps://www.theregister.co.uk/2017/10/16/roca_crypto_vuln_infineon_chips/https://github.com/nuclearcat/cedarkeyhttps://www.kb.cert.org/vuls/id/307015