Products
wolfSSL
- before 5.7.0
Source
facts@wolfssl.com
Tags
CVE-2024-5288 details
Published : Aug. 27, 2024, 7:15 p.m.
Last Modified : Aug. 27, 2024, 7:15 p.m.
Last Modified : Aug. 27, 2024, 7:15 p.m.
Description
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
CVSS Score
1 | 2 | 3 | 4 | 5.1 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-922 | Insecure Storage of Sensitive Information | The product stores sensitive information without properly limiting read or write access by unauthorized actors. |
CVSS Data
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
5.1
Exploitability Score
1.4
Impact Score
3.6
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
References
URL | Source |
---|---|
https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable | facts@wolfssl.com |
This website uses the NVD API, but is not approved or certified by it.