vulnerability
Arch Linux: Private key recovery (CVE-2019-18222)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | Jan 23, 2020 | Jul 11, 2025 | Nov 27, 2025 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
Jan 23, 2020
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto before 3.0.1 and Mbed TLS before 2.20.0, 2.16.4 or 2.7.13 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.
Solution
arch-linux-upgrade-latest
References
- CVE-2019-18222
- https://attackerkb.com/topics/CVE-2019-18222
- URL-https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3GWQNONS7GRORXZJ7MOJFUEJ2ZJ4OUW/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGDACU65MYZXXVPQP2EBHUJGOR4RWLVY/
- URL-https://security.archlinux.org/ASA-202003-7
- URL-https://tls.mbed.org/tech-updates/security-advisories
- URL-https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-12
- CWE-203
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.