Breaking RSA through Insufficiently Random Primes
Basically, the SafeZone library doesn’t sufficiently randomize the two prime numbers it used to generate RSA keys. They’re too close to each other, which makes them vulnerable to recovery.
There aren’t many weak keys out there, but there are some:
So far, Böck has identified only a handful of keys in the wild that are vulnerable to the factorization attack. Some of the keys are from printers from two manufacturers, Canon and Fujifilm (originally branded as Fuji Xerox). Printer users can use the keys to generate a Certificate Signing Request. The creation date for the all the weak keys was 2020 or later. The weak Canon keys are tracked as CVE-2022-26351.
Böck also found four vulnerable PGP keys, typically used to encrypt email, on SKS PGP key servers. A user ID tied to the keys implied they were created for testing, so he doesn’t believe they’re in active use.
Ted • March 16, 2022 12:45 PM
It’s interesting that two printer manufacturers – Canon and Fujifilm – were generating vulnerable keys. Is this something that people see as intentional or just an error?
Could a software bill of materials help find other insecure uses of the SafeZone module?
https://nvd.nist.gov/vuln/detail/CVE-2022-26320