CVE-2024-1544Observable Discrepancy in Wolfssl

Severity
4.9MEDIUMNVD
EPSS
0.2%
top 64.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 27

Description

Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the elliptic curve. Meaning k = r mod n. The division used during the reduction estimates a factor q_e by dividing the upper two digits (a digit having e.g. a size of 8 byte) of r by the upper digit of n and then decrements q_e in a loop until it has the correct size. Observing the number of times q_e is decremented through a control-flow revealing side

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 1.2 | Impact: 3.6

Affected Packages8 packages

debiandebian/wolfssl< wolfssl 5.7.2-0.1 (forky)
NVDwolfssl/wolfssl< 5.7.2
Debianwolfssl/wolfssl< 5.7.2-0.1+1
CVEListV5wolfssl/wolfssl5.6.4

🔴Vulnerability Details

2
OSV
CVE-2024-1544: Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the e2024-08-27
GHSA
GHSA-grjj-54gm-q5vf: Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the e2024-08-27

📋Vendor Advisories

2
Microsoft
ECDSA nonce bias caused by truncation2024-08-13
Debian
CVE-2024-1544: wolfssl - Generating the ECDSA nonce k samples a random number r and then truncates this ...2024
CVE-2024-1544 — Observable Discrepancy in Wolfssl | cvebase