Impact
For release 1.8.0, and test releases with PIV enabled prior to 1.8.0, the PIV application could accept invalid keys for authentication of the admin key.
This could lead to compromise of the integrity of the data stored in the application.
An attacker without access to the proper administration key would be able to generate new keys and overwrite certificates.
Such an attacker would not be able to read-out or extract existing private data, nor would they be able to gain access to cryptographic operations that would normally require PIN-based authentication.
Patches
Fixed in piv-authenticator 0.3.9, and in Nitrokey 3 firmware version 1.8.1
Impact
For release 1.8.0, and test releases with PIV enabled prior to 1.8.0, the PIV application could accept invalid keys for authentication of the admin key.
This could lead to compromise of the integrity of the data stored in the application.
An attacker without access to the proper administration key would be able to generate new keys and overwrite certificates.
Such an attacker would not be able to read-out or extract existing private data, nor would they be able to gain access to cryptographic operations that would normally require PIN-based authentication.
Patches
Fixed in piv-authenticator 0.3.9, and in Nitrokey 3 firmware version 1.8.1