Vulnerability Details CVE-2019-20399
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 59.2%
CVSS Severity
CVSS v3 Score 5.9
CVSS v2 Score 4.3
Products affected by CVE-2019-20399
-
cpe:2.3:a:parity:libsecp256k1:-
-
cpe:2.3:a:parity:libsecp256k1:0.1.0
-
cpe:2.3:a:parity:libsecp256k1:0.1.10
-
cpe:2.3:a:parity:libsecp256k1:0.1.11
-
cpe:2.3:a:parity:libsecp256k1:0.1.12
-
cpe:2.3:a:parity:libsecp256k1:0.1.13
-
cpe:2.3:a:parity:libsecp256k1:0.1.14
-
cpe:2.3:a:parity:libsecp256k1:0.1.15
-
cpe:2.3:a:parity:libsecp256k1:0.1.2
-
cpe:2.3:a:parity:libsecp256k1:0.1.3
-
cpe:2.3:a:parity:libsecp256k1:0.1.4
-
cpe:2.3:a:parity:libsecp256k1:0.1.5
-
cpe:2.3:a:parity:libsecp256k1:0.1.6
-
cpe:2.3:a:parity:libsecp256k1:0.1.7
-
cpe:2.3:a:parity:libsecp256k1:0.1.8
-
cpe:2.3:a:parity:libsecp256k1:0.1.9
-
cpe:2.3:a:parity:libsecp256k1:0.2.0
-
cpe:2.3:a:parity:libsecp256k1:0.2.1
-
cpe:2.3:a:parity:libsecp256k1:0.2.2
-
cpe:2.3:a:parity:libsecp256k1:0.3.0