CVE-2022-4304 — Observable Discrepancy in Openssl
Severity
5.9MEDIUMNVD
EPSS
0.3%
top 51.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 8
Latest updateMar 17
Description
A timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a
Bleichenbacher style attack. To achieve a successful decryption an attacker
would have to be able to send a very large number of trial messages for
decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,
RSA-OEAP and RSASVE.
For example, in a TLS connection, RSA is commonly used by a client to send an
encrypted pre-master secret…
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages17 packages
🔴Vulnerability Details
8OSV▶
CVE-2022-4304: A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a↗2023-02-08
OSV▶
CVE-2022-4304: A timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a↗2023-02-08
📋Vendor Advisories
10Oracle▶
Oracle Oracle Analytics Risk Matrix: Analytics Server, Pipeline Test Failures, Installation (OpenSSL) — CVE-2022-4304↗2024-01-15