Lucene search

K
githubGitHub Advisory DatabaseGHSA-WJ6H-64FC-37MP
HistoryJan 22, 2024 - 9:35 p.m.

Minerva timing attack on P-256 in python-ecdsa

2024-01-2221:35:27
CWE-203
CWE-208
CWE-385
GitHub Advisory Database
github.com
60
minerva timing attack
p-256 curve
python-ecdsa
api function
nonce leakage
private key
ecdsa signatures
key generation
ecdh operations
side channel attacks
software

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

33.0%

python-ecdsa has been found to be subject to a Minerva timing attack on the P-256 curve. Using the ecdsa.SigningKey.sign_digest() API function and timing signatures an attacker can leak the internal nonce which may allow for private key discovery. Both ECDSA signatures, key generation, and ECDH operations are affected. ECDSA signature verification is unaffected. The python-ecdsa project considers side channel attacks out of scope for the project and there is no planned fix.

Affected configurations

Vulners
Node
com.starkbank\starkbankMatchecdsa
CPENameOperatorVersion
ecdsale0.18.0

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

33.0%