{"id":"CVE-2021-24119","details":"In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.","modified":"2026-04-09T07:31:46.072027Z","published":"2021-07-14T13:15:08.100Z","related":["openSUSE-SU-2021:1344-1","openSUSE-SU-2021:1355-1","openSUSE-SU-2021:1389-1","openSUSE-SU-2024:11552-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00034.html"},{"type":"ADVISORY","url":"https://github.com/ARMmbed/mbedtls/releases"},{"type":"ADVISORY","url":"https://github.com/UzL-ITS/util-lookup/blob/main/cve-vulnerability-publication.md"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DRRVY7DMTX3ECFNZKDYTSFEG5AI2HBC6/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EYJW7HAW3TDV2YMDFYXP3HD6WRQRTLJW/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"0"},{"fixed":"e483a77c85e1f9c1dd2eb1c5a8f552d2617fe400"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.26.0"}]}}],"versions":["beta-oob-2","mbedos-release-15-11","mbedos-techcon-oob2","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.2","mbedtls-2.10.0","mbedtls-2.11.0","mbedtls-2.12.0","mbedtls-2.13.0","mbedtls-2.13.1","mbedtls-2.14.0","mbedtls-2.16.0","mbedtls-2.19.0","mbedtls-2.19.0d1","mbedtls-2.19.0d2","mbedtls-2.19.1","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.20.0","mbedtls-2.20.0d0","mbedtls-2.21.0","mbedtls-2.22.0d0","mbedtls-2.24.0","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0","mbedtls-2.7.0-rc1","mbedtls-2.8.0","mbedtls-2.8.0-rc1","mbedtls-2.9.0","polarssl-1.2.0","polarssl-1.2.1","polarssl-1.2.2","polarssl-1.2.4","polarssl-1.2.5","polarssl-1.2.6","polarssl-1.3.0","polarssl-1.3.0-rc0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9","v2.24.0","yotta-2.3.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-24119.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}]}