CVE-2024-5288Insecure Storage of Sensitive Information in Wolfssl

Severity
5.9MEDIUMNVD
EPSS
0.1%
top 74.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 27

Description

An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages8 packages

debiandebian/wolfssl< wolfssl 5.7.2-0.1 (forky)
NVDwolfssl/wolfssl< 5.7.2
Debianwolfssl/wolfssl< 5.7.2-0.1+1
CVEListV5wolfssl_inc/wolfssl5.7.0

🔴Vulnerability Details

2
OSV
CVE-2024-5288: An issue was discovered in wolfSSL before 52024-08-27
GHSA
GHSA-rrg9-cmw9-3pwx: An issue was discovered in wolfSSL before 52024-08-27

📋Vendor Advisories

2
Microsoft
Safe-error attack on TLS 1.3 Protocol2024-08-13
Debian
CVE-2024-5288: wolfssl - An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhamm...2024
CVE-2024-5288 — Wolfssl vulnerability | cvebase