CVE-2020-15309Race Condition in Wolfssl

CWE-362Race Condition5 documents5 sources
Severity
7.0HIGHNVD
EPSS
0.1%
top 71.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 21
Latest updateMay 24

Description

An issue was discovered in wolfSSL before 4.5.0, when single precision is not employed. Local attackers can conduct a cache-timing attack against public key operations. These attackers may already have obtained sensitive information if the affected system has been used for private key operations (e.g., signing with a private key).

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages3 packages

debiandebian/wolfssl< wolfssl 4.5.0+dfsg-1 (bookworm)
NVDwolfssl/wolfssl< 4.5.0
Debianwolfssl/wolfssl< 4.5.0+dfsg-1+3

🔴Vulnerability Details

2
GHSA
GHSA-hrmr-g9x6-f5v8: An issue was discovered in wolfSSL before 42022-05-24
OSV
CVE-2020-15309: An issue was discovered in wolfSSL before 42020-08-21

📋Vendor Advisories

1
Debian
CVE-2020-15309: wolfssl - An issue was discovered in wolfSSL before 4.5.0, when single precision is not em...2020

📄Research Papers

1
arXiv
CACHE SNIPER : Accurate timing control of cache evictions2020-08-27
CVE-2020-15309 — Race Condition in Wolfssl | cvebase