Observable Timing Discrepancy Affecting rsa package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.09% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUST-RSA-6092045
  • published 29 Nov 2023
  • disclosed 28 Nov 2023
  • credit Hubert Kario

How to fix?

There is no fixed version for rsa.

Overview

Affected versions of this package are vulnerable to Observable Timing Discrepancy. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key (Marvin).

Workaround

This vulnerability can be mitigated by avoiding using the rsa crate in settings where attackers are able to observe timing information.

CVSS Scores

version 3.1
Expand this section

Snyk

7.4 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    None
Expand this section

NVD

5.9 medium