Security Advisory 2017-10-16
Tracking IDs: YSA-2017-01 and CVE-2017-15361
Infineon Technologies, one of Yubico’s secure element vendors, informed us of a security issue in their firmware cryptographic libraries. The issue weakens the strength of on-chip RSA key generation and affects some use cases for the Personal Identity Verification (PIV) smart card and OpenPGP functionality of the YubiKey 4 platform.
Other functions of the YubiKey 4, including PIV Smart Cards with ECC keys, FIDO U2F, Yubico OTP, and OATH functions, are not affected. YubiKey NEO and FIDO U2F Security Key are not impacted.
We have created a dedicated customer portal to provide additional information to help customers determine if they are affected and to provide mitigation recommendations.
Summary Of The Issue
The Infineon RSA key generation issue was discovered by an independent team of researchers from the University of Masaryk in the Czech Republic. The researchers found a method to identify mathematical weaknesses of particular algorithms for prime number generation.The method allows an attacker who only has the public portion of an RSA key pair generated on the secure element to compute the private key faster than the current state of the art attack.
Infineon confirms that the RSA key generation implemented in one of their cryptographic libraries is affected. The root cause of the issue lies within the cryptographic software library, not in the secure element itself – the symmetric and asymmetric hardware co-processors are not affected.
To ensure the YubiKey 4 offers strong security for all functions, Yubico switched to a different, broadly scrutinized and deployed key generation function. All YubiKey 4 products shipped by Yubico after June 6, 2017 (version 4.3.5 or higher) use this new implementation. The new implementation has been vetted by the security researchers who discovered the original issue as well as by professional security auditors.
Affected customers may find options for how to address this issue on the dedicated customer portal.
For users of the PIV smart card feature who have previously generated private RSA keys on the YubiKey 4 (version 4.2.6 – 4.3.4), we recommend either regenerating private keys using ECC algorithms, or if RSA keys are required, regenerating keys off the YubiKey 4 and loading them onto the YubiKey 4.
For users of OpenPGP who have previously generated private RSA keys on the YubiKey 4 (version 4.2.6 – 4.3.4) we recommend regenerating private keys off the YubiKey 4 and loading the new keys onto the YubiKey 4.
For more detailed information please refer to the Yubico Mitigation Recommendations accessible on the dedicated customer portal.
|2017-05-12||Infineon Technologies informed Yubico, under strict Coordinated Vulnerability Disclosure restrictions, of the issue discovered in an Infineon cryptographic library.|
|2017-06-06||Yubico remedied this issue in all shipping YubiKey 4 devices.|
|2017-06-06 – 2017-10-16||Yubico works with Infineon and the team of researchers from the University of Masaryk to assess potentially impacted services.|
|2017-10-16||The security researchers from the University of Masaryk publish their research and the Coordinated Vulnerability Disclosure embargo is lifted. Yubico issues this Security Advisory to customers, offering mitigation recommendations and a key replacement program for affected customers.|