Timing Attack Affecting fastecdsa package, versions [,2.1.2)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.21% (60th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-FASTECDSA-570964
  • published3 Jun 2020
  • disclosed3 Jun 2020
  • creditUnknown

Introduced: 3 Jun 2020

CVE-2020-12607  (opens in a new tab)
CWE-208  (opens in a new tab)

How to fix?

Upgrade fastecdsa to version 2.1.2 or higher.

Overview

fastecdsa is a python package for doing fast elliptic curve cryptography, specifically digital signatures.

Affected versions of this package are vulnerable to Timing Attack. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail.

CVSS Scores

version 3.1