ROCA vulnerability impact on Gemalto IDPrime .NET smart cards

We have reasonable grounds to believe that all Gemalto IDPrime .NET smart cards generate weak RSA keys vulnerable to the recently published ROCA vulnerability (CVE-2017-15361, VU#307015). Gemalto stopped selling these cards in September 2017, but there are large numbers of cards still in use in corporate environments. Their primary use is in enterprise PKI systems for secure email, VPN access, and so on.

The ROCA vulnerability does NOT seem to affect Gemalto IDPrime MD cards. We have also NO reason to suspect the ROCA vulnerability to affect Protiva PIV smart cards, although we couldn’t test any of these.
We have collected a number of reports of weak keys generated by cards manufactured between 2008 and 2017 over this week. All reports so far confirm RSA keys affected by the ROCA vulnerability.
As first indications suggest a better proof of the vulnerability may be required due to the potential impact on their users, we have generated a short RSA key (512 bits). Despite its short length, it verifies the validity of our assumption that the available key testing tools are accurate. While this key length is not acceptable for any practical use, breaking these RSA keys still requires several gigabytes of disk space and days of processing on a desktop computer.
We asked the team from Masaryk University to attempt the factorization of this key. They completed the actual factorization, using a low cost virtual machine in less than 20 minutes, fully in line with the theoretical estimate of less than 2 hours. (Update: another key took 3 minutes on a laptop.)

The checker available online ( showed the key as vulnerable, and the toolkit used by Masaryk university was identical they used to verify ROCA vulnerability previously.
Suggested actions:
  • Follow updates from Gemalto and any advise it will provide to its customers.
  • Initiate your internal security incident plans.
  • If your internal assessment concludes that you need to take remediation action, please consider the following notes:

If you use affected smart cards and they generate their RSA keys, you will need to either change the way you generate the keys, the algorithm you use (RSA to Elliptic curve signature), or replace smart cards with secure ones.

There may still be applications using 1,024 bit keys, which can be factored in minutes once the attacker gets respective public keys. (there can be practical reasons for this configuration – e.g., signatures are used for authentication in combination with passwords, generation of longer keys fails and as it times out sessions of web-based applications). The ROCA vulnerability completely changes relevant risk profiles and you’re strongly advised to re-evaluate an impact of this change.
Complete remediation of vulnerable systems where .NET smart cards are used for authentication requires replacement of smart cards, and revocation of all certificates issued for insecure keys. Temporarily, the risk can be managed by increasing the key length (3072 bits) or by shortening the validity of certificates.
If application(s) utilizing .NET smart cards protect documents or messages, where you rely on an ability to verify the content or the origin for a longer period of time, you may also need to implement additional security mechanisms, which can be used to verify the documents haven’t changed since their creation or delivery if there’s a dispute about the content or the origin.
If you already implemented multiple protection mechanisms to increase your resiliency against cyber attacks, you are advised to evaluate the change in your risk exposure and implement appropriate changes to protect your company from any new unacceptable risk.

Try the Professional HTTPS/TLS monitoring service to keep on top of your certificates with its certificate auto-discovery. The public cloud service is free and allows you monitor thousands of certificates within minutes (YouTube video – 49 seconds).

About Author

Dan Cvrcek

Co-founder of Radical Prime and Enigma Bridge. Indendent consultant on security and encryption systems (incl. large banking, payment, and enterprise systems) ... and a university professor.


ROCA vulnerability and Axalto / Gemalto .NET v2 smartcards – Magic of Security

21st October 2017 at 7:20 am

[…] ROCA vulnerability impact on Gemalto IDPrime .NET smart cards 20th October 2017 […]

ROCA 'around the lock: Gemalto says IDPrime .NET entry playing cards bitten by TPM RSA key gremlin | NETWORKFIGHTS.COM

23rd October 2017 at 8:42 pm

[…] Cvrcek has blogged concerning the situation right here. […]

ROCA 'round the lock: Gemalto says IDPrime .NET access cards bitten by TPM RSA key gremlin (The Register) |

23rd October 2017 at 8:47 pm

[…] Cvrcek has blogged about the issue here. […]

Des millions de cartes à puces Gemalto victimes de la crypto-hécatombe RSA – TeraTech | Tests, actu high-tech et plus encore !

25th October 2017 at 2:53 am

[…] sa part, le cryptographe Dan Cvrcek, fondateur de la société Enigma Bridge, estime que « toutes les cartes à puce Gemalto […]

Estonia Hits Gemalto Again – Insecure eID cards – Magic of Security

29th September 2018 at 8:32 am

[…] […]

Leave a Reply