CVE Published: 27/08/2024 |
CVE Updated: 27/08/2024 |
CVE Year: 2024 Source: wolfSSL |
Vendor: wolfSSL Inc. |
Product: wolfSSL Status : PUBLISHED
CVE-2024-5288 Description
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,
such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
Metrics
CVSS Version: 3.1 |
Base Score: 5.1 MEDIUM Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
l➤ Exploitability Metrics: Attack Vector (AV)* LOCAL Attack Complexity (AC)* HIGH Privileges Required (PR)* NONE User Interaction (UI)* NONE Scope (S)* UNCHANGED