logo

Database

Description

The system makes use of weak elliptic curves.

Impact

- Produce incorrect results for some unusual curve points - Expose secret data when the input is not a curve point - Expose secret data through branch synchronization - Expose secret data through cache synchronization

Recommendation

Ensure that the curves used are safe for both ECDLP and ECC in general.

Threat

Unauthenticated attacker from the Internet.

Expected Remediation Time

⏱️ 60 minutes.