An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,
such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 27 Aug 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery. | |
Title | Safe-error attack on TLS 1.3 Protocol | |
Weaknesses | CWE-922 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: wolfSSL
Published: 2024-08-27T18:36:28.555Z
Updated: 2024-08-27T19:23:20.376Z
Reserved: 2024-05-23T20:20:44.346Z
Link: CVE-2024-5288
Vulnrichment
Updated: 2024-08-27T19:23:13.998Z
NVD
Status : Awaiting Analysis
Published: 2024-08-27T19:15:17.797
Modified: 2024-08-28T12:57:39.090
Link: CVE-2024-5288
Redhat
No data.