wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure:

--enable-all CFLAGS="-DWOLFSSL_STATIC_RSA"

The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6.  Therefore the default build since 3.6.6, even with "--enable-all", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent.

The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed.

Subscriptions

Vendors Products
Wolfssl Subscribe
Wolfssl Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-59133 wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure: --enable-all CFLAGS="-DWOLFSSL_STATIC_RSA" The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6.  Therefore the default build since 3.6.6, even with "--enable-all", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent. The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed.
Fixes

Solution

Upgrade wolfSSL to 5.6.6


Workaround

* Do not enable static RSA cipher suites * Use TLS 1.3 * Build with --enable-sp, or --enable-sp-asm

History

Thu, 07 Nov 2024 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfssl
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Vendors & Products Wolfssl
Wolfssl wolfssl

cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2024-08-02T08:42:08.533Z

Reserved: 2023-12-18T22:00:54.166Z

Link: CVE-2023-6935

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:08.533Z

cve-icon NVD

Status : Modified

Published: 2024-02-09T23:15:08.030

Modified: 2024-11-21T08:44:52.217

Link: CVE-2023-6935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses