CVE-2021-36647

Source
https://cve.org/CVERecord?id=CVE-2021-36647
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-36647.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-36647
Downstream
Published
2023-01-17T21:15:10.880Z
Modified
2026-02-13T08:46:32.137465Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Use of a Broken or Risky Cryptographic Algorithm in the function mbedtlsmpiexp_mod() in lignum.c in Mbed TLS Mbed TLS all versions before 3.0.0, 2.27.0 or 2.16.11 allows attackers with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) to recover the private keys used in RSA.

References

Affected packages

Git / github.com/armmbed/mbedtls

Affected ranges

Type
GIT
Repo
https://github.com/armmbed/mbedtls
Events

Affected versions

mbedtls-2.*
mbedtls-2.17.0
mbedtls-2.18.0
mbedtls-2.19.0
mbedtls-2.19.0d1
mbedtls-2.19.0d2
mbedtls-2.19.1
mbedtls-2.20.0
mbedtls-2.20.0d0
mbedtls-2.20.0d1
mbedtls-2.21.0
mbedtls-2.22.0
mbedtls-2.22.0d0
mbedtls-2.23.0
mbedtls-2.24.0
mbedtls-2.25.0
mbedtls-2.26.0
v2.*
v2.23.0
v2.24.0
v2.25.0
v2.26.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-36647.json"