HomeInfineonCVE-2017-15361

CVE-2017-15361

MEDIUM
5.9CVSS
Published: 2017-10-16
Updated: 2025-04-20
AI Analysis

Description

The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.

CVSS Metrics

Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
none
Availability
none
Weaknesses
NVD-CWE-noinfo

Metadata

Primary Vendor
INFINEON
Published
10/16/2017
Last Modified
4/20/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

infineon : trusted_platform_firmwareinfineon : trusted_platform_firmwareinfineon : trusted_platform_firmwareinfineon : trusted_platform_firmwareinfineon : rsa_library

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2017-15361 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com