Vulnerability Description
STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to abuse signature verification. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| St | Stsafe-J Firmware | 1.1.4 |
| St | Stsafe-J | - |
| St | J-Safe3 Firmware | 1.2.5 |
| St | J-Safe3 | - |
Related Weaknesses (CWE)
References
- https://community.st.com/s/toparticlesVendor Advisory
- https://www.cert.ssi.gouv.fr/avis/CERTFR-2022-AVI-169/Third Party Advisory
- https://community.st.com/s/toparticlesVendor Advisory
- https://www.cert.ssi.gouv.fr/avis/CERTFR-2022-AVI-169/Third Party Advisory
FAQ
What is CVE-2021-43393?
CVE-2021-43393 is a vulnerability with a CVSS score of 6.2 (MEDIUM). STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to abuse signature verification. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 a...
How severe is CVE-2021-43393?
CVE-2021-43393 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-43393?
Check the references section above for vendor advisories and patch information. Affected products include: St Stsafe-J Firmware, St Stsafe-J, St J-Safe3 Firmware, St J-Safe3.