Centre for Research on Cryptography and Security reported a vulnerability (CVE-2017-15361) in implementation of RSA key-pair generation in a cryptographic library used in a wide range of cryptographic chips produced by Infineon Technologies AG. The affected products include NIST FIPS 140-2 and CC EAL 5+ certified devices since at least the year 2012. Notably these products are generally integrated in authentication, signature and encryption tokens of other vendors and chips used for Trusted Boot of operating systems. Researchers successfully gained private key for sample of known public keys using factorization attack. Leveraging this attack an attacker can break 1024 or 2048 bit RSA encryption. As calculated by the researchers the maximum computation cost of performing such attacks were $80 USD for 1024-bit and $40,000 for 2048-bit encryption.
Notably major vendors including Microsoft, Google, HP, Lenovo, Fujitsu already released the software updates and guidelines for a mitigation. Researchers in upcoming conference will release full details of the factorization attack.
The vulnerability was discovered by a collaborative effort form security researchers at Masaryk University, Czech Republic, Enigma Bridge Ltd, Cambridge, UK, and Ca’ Foscari University of Venice, Italy.