Vulnerability Details CVE-2020-36315
In RELIC before 2020-08-01, RSA PKCS#1 v1.5 signature forgery can occur because certain checks of the padding (and of the first two bytes) are inadequate. NOTE: this requires that a low public exponent (such as 3) is being used. The product, by default, does not generate RSA keys with such a low number.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 33.8%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2020-36315
-
cpe:2.3:a:relic_project:relic:-
-
cpe:2.3:a:relic_project:relic:0.2.0
-
cpe:2.3:a:relic_project:relic:0.2.1
-
cpe:2.3:a:relic_project:relic:0.3.0
-
cpe:2.3:a:relic_project:relic:0.3.1
-
cpe:2.3:a:relic_project:relic:0.3.2
-
cpe:2.3:a:relic_project:relic:0.3.3
-
cpe:2.3:a:relic_project:relic:0.3.4
-
cpe:2.3:a:relic_project:relic:0.3.5
-
cpe:2.3:a:relic_project:relic:0.4.0
-
cpe:2.3:a:relic_project:relic:0.5.0
-
cpe:2.3:a:relic_project:relic:0.6.0