Vulnerabilities > CVE-2020-6829 - Unspecified vulnerability in Mozilla Firefox
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
NONE Availability impact
NONE Summary
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 12 |
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://www.mozilla.org/security/advisories/mfsa2020-39/