CVE-2019-13628Observable Discrepancy in Wolfcrypt

Severity
4.7MEDIUMNVD
EPSS
0.1%
top 65.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateMay 24

Description

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.0 | Impact: 3.6

Affected Packages4 packages

PyPIwolfssl/wolfcrypt< 4.1.0
debiandebian/wolfssl< wolfssl 4.1.0+dfsg-1 (bookworm)
Debianwolfssl/wolfssl< 4.1.0+dfsg-1+3
NVDwolfssl/wolfssl4.0.0

🔴Vulnerability Details

3
OSV
wolfCrypt leaks cryptographic information via timing side channel2022-05-24
GHSA
wolfCrypt leaks cryptographic information via timing side channel2022-05-24
OSV
CVE-2019-13628: wolfSSL and wolfCrypt 42019-10-03

📋Vendor Advisories

1
Debian
CVE-2019-13628: wolfssl - wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc,...2019
CVE-2019-13628 — Observable Discrepancy in Wolfcrypt | cvebase