Lucene search

K
cveWolfSSLCVE-2024-1544
HistoryAug 27, 2024 - 7:15 p.m.

CVE-2024-1544

2024-08-2719:15:16
CWE-203
wolfSSL
web.nvd.nist.gov
27
ecdsa
nonce
randomness
truncation
control-flow
side-channel
bias
elliptic curve
modular reduction
cve-2024-1544

CVSS3

4.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

9.5%

Generating the ECDSA nonce k samples a random number r and then
truncates this randomness with a modular reduction mod n where n is the
order of the elliptic curve. Meaning k = r mod n. The division used
during the reduction estimates a factor q_e by dividing the upper two
digits (a digit having e.g. a size of 8 byte) of r by the upper digit of
n and then decrements q_e in a loop until it has the correct size.
Observing the number of times q_e is decremented through a control-flow
revealing side-channel reveals a bias in the most significant bits of
k. Depending on the curve this is either a negligible bias or a
significant bias large enough to reconstruct k with lattice reduction
methods. For SECP160R1, e.g., we find a bias of 15 bits.

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "wolfSSL",
    "programFiles": [
      "wolfcrypt/src/ecc.c"
    ],
    "vendor": "wolfSSL",
    "versions": [
      {
        "lessThanOrEqual": "5.6.4",
        "status": "affected",
        "version": "0",
        "versionType": "Release"
      }
    ]
  }
]

CVSS3

4.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

9.5%