CVE-2021-24116

In wolfSSL through 4.6.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:52

Type Values Removed Values Added
References () https://github.com/UzL-ITS/util-lookup/blob/main/cve-vulnerability-publication.md - Release Notes, Third Party Advisory () https://github.com/UzL-ITS/util-lookup/blob/main/cve-vulnerability-publication.md - Release Notes, Third Party Advisory
References () https://github.com/wolfSSL/wolfssl/releases - Release Notes, Third Party Advisory () https://github.com/wolfSSL/wolfssl/releases - Release Notes, Third Party Advisory

Information

Published : 2021-07-14 13:15

Updated : 2024-11-21 05:52


NVD link : CVE-2021-24116

Mitre link : CVE-2021-24116

CVE.ORG link : CVE-2021-24116


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-203

Observable Discrepancy