Vulnerabilities > ARM > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-06-18 | CVE-2020-12883 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in ARM Mbed OS 5.15.3 Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. | 6.4 |
2020-04-15 | CVE-2020-10932 | Information Exposure Through Discrepancy vulnerability in multiple products An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. | 4.7 |
2020-03-24 | CVE-2020-10941 | Arm Mbed TLS before 2.16.5 allows attackers to obtain sensitive information (an RSA private key) by measuring cache usage during an import. | 5.9 |
2020-01-23 | CVE-2019-18222 | Information Exposure Through Discrepancy vulnerability in multiple products The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks. | 4.7 |
2019-11-04 | CVE-2019-17210 | Improper Input Validation vulnerability in ARM Mbed-Mqtt and Mbed-Os A denial-of-service issue was discovered in the MQTT library in Arm Mbed OS 2017-11-02. | 5.0 |
2019-09-26 | CVE-2019-16910 | Arm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, use an RNG with insufficient entropy for blinding, which might allow an attacker to recover a private key via side-channel attacks if a victim signs the same message many times. | 5.3 |
2019-01-30 | CVE-2018-19440 | Information Exposure vulnerability in ARM Trusted Firmware-A ARM Trusted Firmware-A allows information disclosure. | 5.0 |
2018-12-18 | CVE-2017-15031 | Information Exposure vulnerability in ARM Arm-Trusted-Firmware In all versions of ARM Trusted Firmware up to and including v1.4, not initializing or saving/restoring the PMCR_EL0 register can leak secure world timing information. | 5.0 |
2018-10-08 | CVE-2018-5402 | Cryptographic Issues vulnerability in Auto-Maskin products The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN Impact: An attacker once authenticated can change configurations, upload new configuration files, and upload executable code via file upload for firmware updates. | 6.5 |
2018-10-08 | CVE-2018-5401 | Cleartext Transmission of Sensitive Information vulnerability in Auto-Maskin products The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. | 4.3 |