CVE-2019-1547 — Client-Side Enforcement of Server-Side Security in Openssl
Severity
4.7MEDIUMNVD
EPSS
0.3%
top 50.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 10
Latest updateDec 29
Description
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result i…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.0 | Impact: 3.6
Affected Packages7 packages
▶CVEListV5openssl/opensslFixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s), Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k), Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c)+2
🔴Vulnerability Details
5📋Vendor Advisories
11Oracle
▶
📄Research Papers
1arXiv▶
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware↗2022-12-29
💬Community
7Bugzilla
▶
Bugzilla▶
CVE-2019-1547 mingw-openssl: openssl: side-channel weak encryption vulnerability [epel-7]↗2019-09-13
Bugzilla▶
CVE-2019-1563 openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey↗2019-09-13
Bugzilla▶
CVE-2019-1547 mingw-openssl: openssl: side-channel weak encryption vulnerability [fedora-all]↗2019-09-13