CVE-2018-0737 — Use of a Broken or Risky Cryptographic Algorithm in Openssl
Severity
5.9MEDIUMNVD
OSV4.7
EPSS
38.1%
top 2.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 16
Latest updateNov 28
Description
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages6 packages
▶CVEListV5openssl/opensslFixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o), Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)+1
Also affects: Ubuntu Linux 14.04, 16.04, 17.10
🔴Vulnerability Details
3📋Vendor Advisories
7📄Research Papers
2💬Community
5Bugzilla▶
CVE-2018-0737 mingw-openssl: openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys [epel-7]↗2018-04-17
Bugzilla▶
CVE-2018-0737 openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys [fedora-all]↗2018-04-17
Bugzilla▶
CVE-2018-0737 mingw-openssl: openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys [fedora-all]↗2018-04-17
Bugzilla▶
CVE-2018-0737 openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys↗2018-04-17