Lucene search

K
githubGitHub Advisory DatabaseGHSA-C38W-74PG-36HR
HistoryNov 28, 2023 - 11:28 p.m.

Marvin Attack: potential key recovery through timing sidechannels

2023-11-2823:28:27
CWE-203
CWE-385
GitHub Advisory Database
github.com
8
marvin attack
rsa
timing sidechannels
network security
vulnerability
key recovery
constant-time implementation
timing information
workaround
rust
openssl

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.4%

Impact

Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key.

Patches

No patch is yet available, however work is underway to migrate to a fully constant-time implementation.

Workarounds

The only currently available workaround is to avoid using the rsa crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer is fine.

References

This vulnerability was discovered as part of the “Marvin Attack”, which revealed several implementations of RSA including OpenSSL had not properly mitigated timing sidechannel attacks.

Affected configurations

Vulners
Node
rsanetwitnessRange0.9.6
CPENameOperatorVersion
rsale0.9.6

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.4%

Related for GHSA-C38W-74PG-36HR