Lucene search

K
cveWolfSSLCVE-2024-5288
HistoryAug 27, 2024 - 7:15 p.m.

CVE-2024-5288

2024-08-2719:15:17
CWE-922
wolfSSL
web.nvd.nist.gov
25
wolfssl
ecdsa
rowhammer

CVSS3

5.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

9.5%

An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,

such as in server-side TLS connections, the connection is halted if any fault occurs.Β The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "wolfSSL",
    "repo": "https://github.com/wolfSSL/wolfssl",
    "vendor": "wolfSSL Inc.",
    "versions": [
      {
        "lessThanOrEqual": "5.7.0",
        "status": "affected",
        "version": "0",
        "versionType": "git"
      }
    ]
  }
]

CVSS3

5.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

9.5%