Lucene search

K
osvGoogleOSV:GHSA-C38W-74PG-36HR
HistoryNov 28, 2023 - 11:28 p.m.

Marvin Attack: potential key recovery through timing sidechannels

2023-11-2823:28:27
Google
osv.dev
1
marvin attack
key recovery
timing sidechannels
network leakage
constant-time implementation
rsa crate
vulnerability
openssl
timing sidechannel attacks
rustcrypto

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.4%

Impact

Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key.

Patches

No patch is yet available, however work is underway to migrate to a fully constant-time implementation.

Workarounds

The only currently available workaround is to avoid using the rsa crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer is fine.

References

This vulnerability was discovered as part of the “Marvin Attack”, which revealed several implementations of RSA including OpenSSL had not properly mitigated timing sidechannel attacks.

CPENameOperatorVersion
rsale0.9.6

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.4%