CVE-2020-36475Incorrect Calculation of Buffer Size in ARM Mbed TLS

Severity
7.5HIGHNVD
EPSS
1.0%
top 23.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 23
Latest updateMay 24

Description

An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

NVDarm/mbed_tls2.8.02.16.9+2
Debianmbed/mbedtls< 2.16.9-0.1+3

Also affects: Debian Linux 10.0, 9.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-7qm6-rr75-xc68: An issue was discovered in Mbed TLS before 22022-05-24
CVEList
CVE-2020-36475: An issue was discovered in Mbed TLS before 22021-08-23
OSV
CVE-2020-36475: An issue was discovered in Mbed TLS before 22021-08-23

📋Vendor Advisories

3
CISA ICS
Siemens LOGO! CMR and SIMATIC RTU 30002021-09-14
Microsoft
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large paramet2021-08-10
Debian
CVE-2020-36475: mbedtls - An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and bef...2020
CVE-2020-36475 — Incorrect Calculation of Buffer Size | cvebase