ID CVE-2021-3011
Summary An electromagnetic-wave side-channel issue was discovered on NXP SmartMX / P5x security microcontrollers and A7x secure authentication microcontrollers, with CryptoLib through v2.9. It allows attackers to extract the ECDSA private key after extensive physical access (and consequently produce a clone). This was demonstrated on the Google Titan Security Key, based on an NXP A7005a chip. Other FIDO U2F security keys are also impacted (Yubico YubiKey Neo and Feitian K9, K13, K21, and K40) as well as several NXP JavaCard smartcards (J3A081, J2A081, J3A041, J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61, J3D081_M59_DF, J3D081_M61_DF, J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64, J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, J2E082_M65, J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF, and J3E016_M64_DF).
References
Vulnerable Configurations
  • cpe:2.3:h:yubico:yubikey_neo:-:*:*:*:*:*:*:*
    cpe:2.3:h:yubico:yubikey_neo:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:3a081:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:3a081:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2a081:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2a081:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3a041:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3a041:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3d145_m59:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3d145_m59:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2d145_m59:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2d145_m59:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3d120_m60:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3d120_m60:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3d082_m60:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3d082_m60:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2d120_m60:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2d120_m60:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2d082_m60:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2d082_m60:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3d081_m59:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3d081_m59:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2d081_m59:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2d081_m59:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3d081_m61:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3d081_m61:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2d081_m61:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2d081_m61:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3d081_m59_df:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3d081_m59_df:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3d081_m61_df:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3d081_m61_df:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2e081_m64:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2e081_m64:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e145_m64:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e145_m64:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e120_m65:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e120_m65:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e082_m65:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e082_m65:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2e145_m64:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2e145_m64:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2e120_m65:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2e120_m65:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j2e082_m65:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j2e082_m65:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e081_m64_df:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e081_m64_df:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e081_m66_df:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e081_m66_df:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e041_m66_df:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e041_m66_df:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e016_m66_df:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e016_m66_df:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e041_m64_df:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e041_m64_df:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:j3e016_m64_df:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:j3e016_m64_df:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ftsafe:k9:-:*:*:*:*:*:*:*
    cpe:2.3:h:ftsafe:k9:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ftsafe:k13:-:*:*:*:*:*:*:*
    cpe:2.3:h:ftsafe:k13:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ftsafe:k21:-:*:*:*:*:*:*:*
    cpe:2.3:h:ftsafe:k21:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ftsafe:k40:-:*:*:*:*:*:*:*
    cpe:2.3:h:ftsafe:k40:-:*:*:*:*:*:*:*
  • cpe:2.3:h:google:titan_security_key:-:*:*:*:*:*:*:*
    cpe:2.3:h:google:titan_security_key:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:p5040:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:p5040:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:p5021:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:p5021:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:p5020:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:p5020:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:p5010:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:p5010:-:*:*:*:*:*:*:*
  • cpe:2.3:h:nxp:a7005a:-:*:*:*:*:*:*:*
    cpe:2.3:h:nxp:a7005a:-:*:*:*:*:*:*:*
CVSS
Base: 1.9 (as of 15-02-2024 - 21:20)
Impact:
Exploitability:
CWE CWE-670
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:M/Au:N/C:P/I:N/A:N
refmap via4
misc
Last major update 15-02-2024 - 21:20
Published 07-01-2021 - 16:15
Last modified 15-02-2024 - 21:20
Back to Top