A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-31886 A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Wed, 06 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-09-12T20:05:19.621Z

Reserved: 2024-04-04T03:01:36.169Z

Link: CVE-2024-3296

cve-icon Vulnrichment

Updated: 2024-08-01T20:05:08.371Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-04T14:15:11.080

Modified: 2024-11-21T09:29:20.493

Link: CVE-2024-3296

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-03-15T00:00:00Z

Links: CVE-2024-3296 - Bugzilla

cve-icon OpenCVE Enrichment

No data.