Timing and Power Analysis Vulnerabilities in Microchip Atmel ATSAMA5 Products
CVE-2020-12788

7.5HIGH

Key Information:

Vendor

Microchip

Vendor
CVE Published:
14 September 2020

What is CVE-2020-12788?

The CMAC verification functionality in Microchip Atmel ATSAMA5 products is susceptible to both timing and power analysis attacks. These vulnerabilities can be exploited by malicious actors to gain unauthorized access or manipulate sensitive information. The flaws arise in how certain cryptographic operations are performed, allowing attackers to observe variations in time and power consumption, which can reveal critical information about the cryptographic keys and operations involved. It is essential for users and organizations employing ATSAMA5 products to implement security measures to mitigate the risk posed by these vulnerabilities.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.