Vulnerability Details CVE-2020-11684
AT91bootstrap before 3.9.2 does not properly wipe encryption and authentication keys from memory before passing control to a less privileged software component. This can be exploited to disclose these keys and subsequently encrypt and sign the next boot stage (such as the bootloader).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 39.0%
CVSS Severity
CVSS v3 Score 9.1
CVSS v2 Score 6.4
Products affected by CVE-2020-11684
-
cpe:2.3:a:linux4sam:at91bootstrap:3.7.2
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.1
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.10
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.11
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.13
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.2
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.3
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.4
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.5
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.6
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.7
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.8
-
cpe:2.3:a:linux4sam:at91bootstrap:3.8.9
-
cpe:2.3:a:linux4sam:at91bootstrap:3.9.0
-
cpe:2.3:a:linux4sam:at91bootstrap:3.9.1