• Security Advisory YSA-2020-05

    Security Advisory YSA-2020-05 – OpenPGP application Resetting Code bug

    Published date: 2020-07-08
    Tracking ID: YSA-2020-05
    CVE: CVE-2020-15000

    Summary

    As defined by the OpenPGP specification, the application has three passwords: Admin PIN, Resetting Code, and User PIN. The Resetting Code is used to reset the User PIN, but it is disabled by default. When the Reset Code counter is set to a non-zero number, the Resetting Code is initialized to a known value. This known value can be used to reset the User PIN. To set the retry counters, the Admin PIN is required.

    Affected Yubico devices

    YubiKey 5 Series with firmware versions from 5.2.0 to 5.2.6.

    Customer actions

    Open the YubiKey Manager to view the firmware version of your YubiKey.

    Picture of YubiKey 5 NFC

    The command line interface (CLI) can also be used:
    $ ykman info|grep version
    Firmware version: 5.2.4

    In the example above, the firmware version is 5.2.4, which means this key could be affected. If the firmware version is between 5.2.0 and 5.2.6, your key is affected and you should proceed to check the Reset Code counter from the YubiKey Manager CLI:
    $ ykman openpgp info
    OpenPGP version: 3.4
    Application version: 5.2.4
    PIN tries remaining: 0
    Reset code tries remaining: 0
    Admin PIN tries remaining: 3

    Observe the number after “Reset code tries remaining”, the Reset Code counter. If this is 0 (default), it means you are not currently affected. If this is any number other than 0, it means you are affected. Changing the Reset Code counter to something other than 0 will require setting a Resetting Code to mitigate this issue.

    Mitigation

    If you have a non-zero Resetting Code counter, we advise you to set the Resetting Code explicitly unless you have already done this. The following command will require the Admin PIN:
    $ gpg --edit-card -> admin -> passwd -> 4 (Set Resetting Code)

    Enabling touch for all OpenPGP application operations also reduces the impact by requiring physical access to the YubiKey or user interaction to touch the key. Use ykman to verify and change the touch policy:

    $ ykman openpgp info
    [ .. ]
    Touch policies
    Signature key On (fixed)
    Encryption key On (fixed)
    Authentication key Off

    The following command will enable touch for the authentication key:
    $ ykman openpgp set-touch aut on

    Technical details

    When the OpenPGP application is initialized, the password content and its lengths are set to known values for the User and Admin PINs. The Resetting Code field is cleared with zeroes.

    The same initialization function was used to set passwords back to their default. The Resetting Code does not have a default password so when clearing it, the maximum value of its length was used. This had the side effect that the length field of the cleared Resetting Code was set to its maximum length when it should have been set to 0.

    Aggregate severity rating

    Yubico has rated this issue as Moderate based on maximum security impact. The base CVSS score is 6.1