The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
History

Wed, 04 Sep 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl wolfssl
Weaknesses CWE-203
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Vendors & Products Wolfssl wolfssl

Fri, 30 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfcrypt
CPEs cpe:2.3:a:wolfssl:wolfcrypt:*:*:*:*:*:*:*:*
Vendors & Products Wolfssl
Wolfssl wolfcrypt
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Aug 2024 23:00:00 +0000

Type Values Removed Values Added
Description The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
Title AES T-Table sub-cache-line leakage
Weaknesses CWE-208
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published: 2024-08-29T22:43:35.775Z

Updated: 2024-08-30T14:19:32.248Z

Reserved: 2024-02-15T17:34:06.930Z

Link: CVE-2024-1543

cve-icon Vulnrichment

Updated: 2024-08-30T14:19:11.271Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-29T23:15:10.067

Modified: 2024-09-04T14:26:29.407

Link: CVE-2024-1543

cve-icon Redhat

No data.