Vulnerability Note VU#307015
Infineon RSA library does not properly generate RSA key pairs
The Infineon RSA library version 1.02.013 does not properly generate RSA key pairs, which may allow an attacker to recover the RSA private key corresponding to an RSA public key generated by this library. This vulnerability is often cited as "ROCA" in the media.
CWE-310: Cryptographic Issues - CVE-2017-15361
The Infineon RSA library version 1.02.013 does not properly generate RSA key pairs. As a result, the keyspace required for a brute force search is lessened such that it is feasible to factorize keys under at least 2048 bits and obtain the RSA private key. The attacker needs only access to the victim's RSA public key generated by this library in order to calculate the private key.
A remote attacker may be able recover the RSA private key from a victim's public key, if it was generated by the Infineon RSA library.
Apply an update
Replace the device
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Atos SE||Affected||24 Oct 2017||24 Oct 2017|
|Dell||Affected||19 Oct 2017||24 Oct 2017|
|Fujitsu||Affected||16 Oct 2017||16 Oct 2017|
|Gemalto AV||Affected||18 Oct 2017||02 Nov 2017|
|Affected||16 Oct 2017||16 Oct 2017|
|Hewlett Packard Enterprise||Affected||16 Oct 2017||16 Oct 2017|
|Infineon Technologies AG||Affected||16 Oct 2017||24 Oct 2017|
|Lenovo||Affected||16 Oct 2017||16 Oct 2017|
|Microsoft Corporation||Affected||16 Oct 2017||16 Oct 2017|
|Rubrik||Affected||24 Oct 2017||24 Oct 2017|
|Taglio LLC||Affected||-||02 Nov 2017|
|WinMagic||Affected||16 Oct 2017||16 Oct 2017|
|Yubico||Affected||16 Oct 2017||16 Oct 2017|
CVSS Metrics (Learn More)
This vulnerability was disclosed by Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, and Vashek Matyas.
This document was written by Garret Wassermann.
- CVE IDs: CVE-2017-15361
- Date Public: 16 Oct 2017
- Date First Published: 16 Oct 2017
- Date Last Updated: 08 Nov 2017
- Document Revision: 59
If you have feedback, comments, or additional information about this vulnerability, please send us email.