Missing Cryptographic Step Affecting armmbed/mbedtls package, versions [2.26.0,2.28.9) [3.0.0,3.6.1)
Threat Intelligence
EPSS
0.05% (22nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-ARMMBEDMBEDTLS-7919066
- published 6 Sep 2024
- disclosed 5 Sep 2024
- credit Unknown
Introduced: 5 Sep 2024
CVE-2024-45157 Open this link in a new tabHow to fix?
Upgrade armmbed/mbedtls
to version 2.28.9, 3.6.1 or higher.
Overview
Affected versions of this package are vulnerable to Missing Cryptographic Step due to the incorrectly documented algorithm selection mechanism. An attacker can bypass security restrictions by exploiting the misconfiguration in the cryptographic algorithm selection process.
Workaround
To use HMAC_DRBG
as the pseudorandom generator in the PSA subsystem, make sure that the compile-time option MBEDTLS_CTR_DRBG_C
is disabled.