An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
References
Configurations
Configuration 1 (hide)
|
History
22 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Feb 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Feb 2024, 01:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/ - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Arm mbed Tls
Arm |
|
CWE | CWE-203 | |
CPE | cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:* |
31 Jan 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-31 08:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-23170
Mitre link : CVE-2024-23170
CVE.ORG link : CVE-2024-23170
JSON object : View
Products Affected
arm
- mbed_tls
CWE
CWE-203
Observable Discrepancy