Lucene search

K
cvelistWolfSSLCVELIST:CVE-2024-5288
HistoryAug 27, 2024 - 6:36 p.m.

CVE-2024-5288 Safe-error attack on TLS 1.3 Protocol

2024-08-2718:36:28
CWE-922
wolfSSL
www.cve.org
4
cve-2024-5288
wolfssl
tls 1.3
safe-error attack
rowhammer
fault+probe
ecdsa key disclosure

CVSS3

5.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0

Percentile

9.5%

An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,

such as in server-side TLS connections, the connection is halted if any fault occurs.Β The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "wolfSSL",
    "repo": "https://github.com/wolfSSL/wolfssl",
    "vendor": "wolfSSL Inc.",
    "versions": [
      {
        "lessThanOrEqual": "5.7.0",
        "status": "affected",
        "version": "0",
        "versionType": "git"
      }
    ]
  }
]

CVSS3

5.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0

Percentile

9.5%