CVE-2020-24387

HIGH

yh_create_session() <2.0.2 - DoS

Title source: llm
STIX 2.1

Description

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

References (5)

Core 5
Core References
Vendor Advisory x_refsource_misc
https://developers.yubico.com/yubihsm-shell/
Exploit, Third Party Advisory x_refsource_misc
https://blog.inhq.net/posts/yubico-libyubihsm-vuln/

Scores

CVSS v3 7.5
EPSS 0.0079
EPSS Percentile 73.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125 CWE-787
Status published
Products (2)
fedoraproject/fedora 33
yubico/yubihsm-shell < 2.0.2
Published Oct 19, 2020
Tracked Since Feb 18, 2026