By Daniel Franke, Infosec Researcher
Akamai is aware of the recently-disclosed “ROCA” vulnerability in cryptographic firmware used in products made by Infineon Technologies. A bug in the firmware’s prime-search algorithm used for RSA key generation results in RSA keys that are relatively cheap and inexpensive to factor. The bug impacts Infineon Trusted Platform Modules (TPMs) as well as many smartcards and Hardware Security Modules (HSMs) that use Infineon chips but do not carry Infineon branding, notably including the popular YubiKey 4. In some cases, it may be possible to patch affected devices with an OEM-supplied firmware update. In other cases, the hardware must be replaced.
Any RSA key generated on a vulnerable device must be considered compromised and be revoked and rotated. Keys for algorithms other than RSA, such as OpenSSH, are unaffected. RSA keys generated in software and then transferred onto vulnerable devices are also unaffected. You can test whether a key is vulnerable by uploading the public key to https://keychest.net/roca.
Akamai has determined that no customer-facing systems are impacted by this vulnerability; in particular, customer TLS certificates are unaffected and no action is needed.
*** This is a Security Bloggers Network syndicated blog from The Akamai Blog authored by Akamai InfoSec. Read the original post at: http://feedproxy.google.com/~r/TheAkamaiBlog/~3/dxiFAZcvJ_M/what-you-need-to-know-about-the-roca-vulnerability.html