The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
Metrics
Affected Vendors & Products
References
History
Wed, 04 Sep 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wolfssl wolfssl
|
|
Weaknesses | CWE-203 | |
CPEs | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wolfssl wolfssl
|
Fri, 30 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wolfssl
Wolfssl wolfcrypt |
|
CPEs | cpe:2.3:a:wolfssl:wolfcrypt:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wolfssl
Wolfssl wolfcrypt |
|
Metrics |
ssvc
|
Thu, 29 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500 | |
Title | AES T-Table sub-cache-line leakage | |
Weaknesses | CWE-208 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: wolfSSL
Published: 2024-08-29T22:43:35.775Z
Updated: 2024-08-30T14:19:32.248Z
Reserved: 2024-02-15T17:34:06.930Z
Link: CVE-2024-1543
Vulnrichment
Updated: 2024-08-30T14:19:11.271Z
NVD
Status : Analyzed
Published: 2024-08-29T23:15:10.067
Modified: 2024-09-04T14:26:29.407
Link: CVE-2024-1543
Redhat
No data.