Information Exposure Through Discrepancy Affecting wolfSSL/wolfssh package, versions [,5.7.2)
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-WOLFSSLWOLFSSH-7850355
- published 29 Aug 2024
- disclosed 27 Aug 2024
- credit Luca Wilke, Florian Sieck and Thomas Eisenbarth (University of Lübeck)
Introduced: 27 Aug 2024
CVE-2024-1544 Open this link in a new tabHow to fix?
Upgrade wolfSSL/wolfssh
to version 5.7.2 or higher.
Overview
Affected versions of this package are vulnerable to Information Exposure Through Discrepancy through the modular reduction process used in generating the ECDSA nonce. An attacker can infer the nonce's most significant bits by observing the decrementing behavior of the estimated factor during the reduction, potentially leading to the reconstruction of the nonce using lattice reduction methods. This is only exploitable if the attacker has access to observe the control-flow revealing side-channel.