{"id":"CVE-2020-10941","details":"Arm Mbed TLS before 2.16.5 allows attackers to obtain sensitive information (an RSA private key) by measuring cache usage during an import.","modified":"2026-03-19T12:39:21.058687Z","published":"2020-03-24T20:15:14.867Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5JPE2HFBDJF3UBT6Q4VWLKNKCVCMX25J/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WD6OSOLLAR2AVPJAMGUKWRXN6477IHHV/"},{"type":"ADVISORY","url":"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-02"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbed-crypto","events":[{"introduced":"0"},{"fixed":"cf4a40ba0a3086cabb5a8227245191161fd26383"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.1.0"}]}},{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"0"},{"fixed":"0fce215851cc069c5b5def12fcc18725055fa6cf"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.16.5"}]}}],"versions":["beta-oob-2","list","mbedcrypto-0.1.0b","mbedcrypto-0.1.0b2","mbedcrypto-1.0.0","mbedcrypto-1.0.0d0","mbedcrypto-1.0.0d1","mbedcrypto-1.0.0d2","mbedcrypto-1.0.0d3","mbedcrypto-1.0.0d4","mbedcrypto-1.0.0d5","mbedcrypto-1.0.0d6","mbedcrypto-1.0.0d7","mbedcrypto-1.1.0","mbedcrypto-1.1.0d0","mbedcrypto-1.1.0d1","mbedcrypto-1.1.0d2","mbedcrypto-1.1.1","mbedcrypto-2.0.0","mbedcrypto-2.0.0d0","mbedcrypto-2.0.0d1","mbedcrypto-2.0.0d2","mbedcrypto-2.1.0d0","mbedcrypto-3.0.0","mbedcrypto-3.0.0d0","mbedcrypto-3.0.1","mbedos-16.01-release","mbedos-16.03-release","mbedos-2016q1-oob1","mbedos-2016q1-oob2","mbedos-2016q1-oob3","mbedos-release-15-11","mbedos-techcon-oob2","mbedtls-1.3.10","mbedtls-1.4-dtls-preview","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.2","mbedtls-2.10.0","mbedtls-2.11.0","mbedtls-2.12.0","mbedtls-2.13.0","mbedtls-2.13.1","mbedtls-2.14.0","mbedtls-2.16.0","mbedtls-2.16.1","mbedtls-2.16.2","mbedtls-2.16.3","mbedtls-2.16.4","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0","mbedtls-2.7.0-rc1","mbedtls-2.8.0","mbedtls-2.8.0-rc1","mbedtls-2.9.0","polarssl-1.2.0","polarssl-1.2.1","polarssl-1.2.2","polarssl-1.2.3","polarssl-1.2.4","polarssl-1.2.5","polarssl-1.2.6","polarssl-1.3.0","polarssl-1.3.0-rc0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9","psa-crypto-api-1.0-beta1","psa-crypto-api-1.0-beta2","psa-crypto-api-1.0-beta3","yotta-2.2.1","yotta-2.2.2","yotta-2.2.3","yotta-2.3.0","yotta-2.3.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10941.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}