Use of a Risky Cryptographic Algorithm Affecting matrixssl/matrixssl package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.41% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of a Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-MATRIXSSLMATRIXSSL-2366436
  • published26 Jan 2022
  • disclosed3 Oct 2019
  • creditUnknown

Introduced: 3 Oct 2019

CVE-2019-13629  (opens in a new tab)
CWE-327  (opens in a new tab)

How to fix?

There is no fixed version for matrixssl/matrixssl.

Overview

Affected versions of this package are vulnerable to Use of a Risky Cryptographic Algorithm. MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.

CVSS Scores

version 3.1