Timing Attack Affecting mbedtls package, versions >=0.0.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-COCOAPODS-MBEDTLS-13645030
  • published21 Oct 2025
  • disclosed20 Oct 2025
  • creditChang Liu, Trevor E. Carlson, Cristiano Rodrigues, Marton Bognar, Sandro Pinto, Jo Van Bulck

Introduced: 20 Oct 2025

NewCVE-2025-54764  (opens in a new tab)
CWE-208  (opens in a new tab)

How to fix?

There is no fixed version for mbedTLS.

Overview

mbedTLS is an An open source, portable, easy to use, readable and flexible SSL library.

Affected versions of this package are vulnerable to Timing Attack via the mbedtls_mpi_mod_inv or mbedtls_mpi_gcd functions. An attacker can recover sensitive information from RSA operations by performing a local timing analysis.

Note: Applications that do not use RSA private keys and do not directly call mbedtls_mpi_inv_mod() or mbedtls_mpi_gcd() are not affected.

Workaround

Applications that do not generate RSA keys and do not import private RSA keys with mbedtls_rsa_import()+mbedtls_rsa_complete(), but use other RSA functions that are only vulnerable with MBEDTLS_RSA_NO_CRT, can recompile without MBEDTLS_RSA_NO_CRT.

CVSS Base Scores

version 4.0
version 3.1