When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leveraged by an attacker to cause an error scenario, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-28115 When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leveraged by an attacker to cause an error scenario, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.
Fixes

Solution

The vulnerability was addressed by improving the point-scalar multiplication algorithm to account for anomalous input and by ensuring that errors are returned from library routines before any output buffer is written. To get the latest version of the Sweet B library, update your local repository from https://github.com/westerndigitalcorporation/sweet-b


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: WDC PSIRT

Published:

Updated: 2024-08-03T03:28:42.836Z

Reserved: 2022-01-10T00:00:00

Link: CVE-2022-23004

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-29T19:15:08.417

Modified: 2024-11-21T06:47:47.213

Link: CVE-2022-23004

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.