CVE-2020-27209

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-27209
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-27209.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-27209
Published
2021-05-20T21:15:07Z
Modified
2025-10-21T05:49:07.087661Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The ECDSA operation of the micro-ecc library 1.0 is vulnerable to simple power analysis attacks which allows an adversary to extract the private ECC key.

References

Affected packages

Git / github.com/kmackay/micro-ecc

Affected ranges

Type
GIT
Repo
https://github.com/kmackay/micro-ecc
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0

Database specific

vanir_signatures

[
    {
        "source": "https://github.com/kmackay/micro-ecc/commit/1b5f5cea5145c96dd8791b9b2c41424fc74c2172",
        "target": {
            "function": "uECC_sign_with_k",
            "file": "uECC.c"
        },
        "id": "CVE-2020-27209-60598547",
        "deprecated": false,
        "signature_type": "Function",
        "signature_version": "v1",
        "digest": {
            "function_hash": "222699852159252611929325926074463076687",
            "length": 1845.0
        }
    },
    {
        "source": "https://github.com/kmackay/micro-ecc/commit/1b5f5cea5145c96dd8791b9b2c41424fc74c2172",
        "target": {
            "function": "bits2int",
            "file": "uECC.c"
        },
        "id": "CVE-2020-27209-b31f0120",
        "deprecated": false,
        "signature_type": "Function",
        "signature_version": "v1",
        "digest": {
            "function_hash": "249593009610380198680253538341254672925",
            "length": 834.0
        }
    },
    {
        "source": "https://github.com/kmackay/micro-ecc/commit/1b5f5cea5145c96dd8791b9b2c41424fc74c2172",
        "target": {
            "file": "uECC.c"
        },
        "id": "CVE-2020-27209-d20a3de7",
        "deprecated": false,
        "signature_type": "Line",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "305101433005125945202075426985025328958",
                "82981267676307096887488090504005731521",
                "334523047272041585545844686517141925718",
                "13219967681721080572505711468151280759",
                "139736703219472062835090805194574720541",
                "322175786906837796354861910254680147535",
                "139494997547063837982264738431661462491",
                "140569503132040539094917951320904837683",
                "124845876707839708836963364657185906542",
                "186514073613650829788803628122917566552",
                "91082451782934131651994864009462108059",
                "71228014830550427819084389676258659648",
                "305779910505877227543853235173718315715",
                "83863216990940013339395728169779516447",
                "259427288176910632657282464550222952273",
                "114011282683818521246207162944723263280",
                "285203304151542375514860935568997894598",
                "244159355370071661642199647957797156413",
                "247101306798905568468182249754245636472",
                "62358630235011342321298773529477473345"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/kmackay/micro-ecc/commit/1b5f5cea5145c96dd8791b9b2c41424fc74c2172",
        "target": {
            "function": "uECC_verify",
            "file": "uECC.c"
        },
        "id": "CVE-2020-27209-da7f5c5c",
        "deprecated": false,
        "signature_type": "Function",
        "signature_version": "v1",
        "digest": {
            "function_hash": "262377679775173692717740381933240475678",
            "length": 3062.0
        }
    }
]