CVE-2020-6829

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
mozillaCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
VendorProductVersion
mozillafirefox
𝑥
< 80.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firefox
sid
132.0.1-1
fixed
nss
bullseye
2:3.61-1+deb11u3
fixed
bullseye (security)
2:3.61-1+deb11u4
fixed
bookworm
2:3.87.1-1
fixed
sid
2:3.105-2
fixed
trixie
2:3.105-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
firefox
focal
Fixed 80.0+build2-0ubuntu0.20.04.1
released
bionic
Fixed 80.0+build2-0ubuntu0.18.04.1
released
xenial
Fixed 80.0+build2-0ubuntu0.16.04.1
released
trusty
dne
nss
focal
Fixed 2:3.49.1-1ubuntu1.4
released
bionic
Fixed 2:3.35-2ubuntu2.11
released
xenial
Fixed 2:3.28.4-0ubuntu0.16.04.13
released
trusty
Fixed 2:3.28.4-0ubuntu0.14.04.5+esm7
released