wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4925 wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
Github GHSA Github GHSA GHSA-q95h-vc86-hv77 wolfCrypt leaks cryptographic information via timing side channel
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:57:39.493Z

Reserved: 2019-07-17T00:00:00

Link: CVE-2019-13628

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-03T14:15:11.057

Modified: 2024-11-21T04:25:23.910

Link: CVE-2019-13628

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses