CVE-2020-10702 — Missing Cryptographic Step in Qemu
Severity
5.5MEDIUMNVD
OSV5.8
EPSS
0.0%
top 89.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 4
Latest updateMay 24
Description
A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages8 packages
🔴Vulnerability Details
3GHSA▶
GHSA-g793-9qm5-f3q5: A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4↗2022-05-24
OSV▶
CVE-2020-10702: A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4↗2020-06-04
📋Vendor Advisories
4Microsoft▶
A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation↗2020-06-09
Debian▶
CVE-2020-10702: qemu - A flaw was found in QEMU in the implementation of the Pointer Authentication (PA...↗2020