An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.
References
Configurations
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2 - Release Notes, Third Party Advisory | |
References | () https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0 - Release Notes, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/ - |
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-12-15 23:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46392
Mitre link : CVE-2022-46392
CVE.ORG link : CVE-2022-46392
JSON object : View
Products Affected
fedoraproject
- fedora
arm
- mbed_tls
CWE
CWE-203
Observable Discrepancy