Covert Timing Channel Affecting mbedtls package, versions <3.6.4-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE320-MBEDTLS-10876054
  • published22 Jul 2025
  • disclosed20 Jul 2025

Introduced: 20 Jul 2025

NewCVE-2025-49087  (opens in a new tab)
CWE-385  (opens in a new tab)

How to fix?

Upgrade Alpine:3.20 mbedtls to version 3.6.4-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mbedtls package and not the mbedtls package as distributed by Alpine. See How to fix? for Alpine:3.20 relevant fixed versions and status.

In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.