<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-45678 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-45678/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Fri, 17 Apr 2026 08:43:36 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-45678</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-45678/#post-552</link>
                        <pubDate>Wed, 04 Sep 2024 16:24:14 +0000</pubDate>
                        <description><![CDATA[Description
Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical a...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description</strong></p>
<p><span>Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is present because of a non-constant-time modular inversion for the Extended Euclidean Algorithm, aka the EUCLEAK issue. Other uses of an Infineon cryptographic library may also be affected.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/" target="_blank" rel="noopener">MISC:https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/</a></li>
<li><a href="https://news.ycombinator.com/item?id=41434500" target="_blank" rel="noopener">MISC:https://news.ycombinator.com/item?id=41434500</a></li>
<li><a href="https://ninjalab.io/eucleak/" target="_blank" rel="noopener">MISC:https://ninjalab.io/eucleak/</a></li>
<li><a href="https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf" target="_blank" rel="noopener">MISC:https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf</a></li>
<li><a href="https://support.yubico.com/hc/en-us/articles/15705749884444" target="_blank" rel="noopener">MISC:https://support.yubico.com/hc/en-us/articles/15705749884444</a></li>
<li><a href="https://www.yubico.com/support/security-advisories/ysa-2024-03/" target="_blank" rel="noopener">MISC:https://www.yubico.com/support/security-advisories/ysa-2024-03/</a></li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>Martha Griffin</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-45678/#post-552</guid>
                    </item>
							        </channel>
        </rss>
		