Vulnerability CVE-2019-13628


Published: 2019-10-03

Description:
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

Type:

CWE-203

(Information Exposure Through Discrepancy)

CVSS2 => (AV:L/AC:H/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
1.2/10
2.9/10
1.9/10
Exploit range
Attack complexity
Authentication
Local
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Wolfssl -> Wolfssl 

 References:
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://eprint.iacr.org/2011/232.pdf
https://minerva.crocs.fi.muni.cz/
https://tches.iacr.org/index.php/TCHES/article/view/7337

Copyright 2024, cxsecurity.com

 

Back to Top