Information Exposure Through Discrepancy Affecting wolfSSL/wolfssh package, versions [,5.7.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-WOLFSSLWOLFSSH-7850355
  • published29 Aug 2024
  • disclosed27 Aug 2024
  • creditLuca Wilke, Florian Sieck and Thomas Eisenbarth (University of Lübeck)

Introduced: 27 Aug 2024

CVE-2024-1544  (opens in a new tab)
CWE-203  (opens in a new tab)

How to fix?

Upgrade wolfSSL/wolfssh to version 5.7.2 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure Through Discrepancy through the modular reduction process used in generating the ECDSA nonce. An attacker can infer the nonce's most significant bits by observing the decrementing behavior of the estimated factor during the reduction, potentially leading to the reconstruction of the nonce using lattice reduction methods. This is only exploitable if the attacker has access to observe the control-flow revealing side-channel.

CVSS Scores

version 4.0
version 3.1