Vulnerability Description
A timing side channel was discovered in AT91bootstrap before 3.9.2. It can be exploited by attackers with physical access to forge CMAC values and subsequently boot arbitrary code on an affected system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux4Sam | At91Bootstrap | >= 3.7.2, < 3.9.2 |
Related Weaknesses (CWE)
References
- https://github.com/linux4sam/at91bootstrap/commit/7753914c9a622c245f3a3cf2af5e24PatchThird Party Advisory
- https://labs.f-secure.com/advisories/microchip-at91bootstrap/ExploitThird Party Advisory
- https://github.com/linux4sam/at91bootstrap/commit/7753914c9a622c245f3a3cf2af5e24PatchThird Party Advisory
- https://labs.f-secure.com/advisories/microchip-at91bootstrap/ExploitThird Party Advisory
FAQ
What is CVE-2020-11683?
CVE-2020-11683 is a vulnerability with a CVSS score of 6.8 (MEDIUM). A timing side channel was discovered in AT91bootstrap before 3.9.2. It can be exploited by attackers with physical access to forge CMAC values and subsequently boot arbitrary code on an affected syste...
How severe is CVE-2020-11683?
CVE-2020-11683 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-11683?
Check the references section above for vendor advisories and patch information. Affected products include: Linux4Sam At91Bootstrap.