An issue was discovered in wolfSSL before 4.5.0, when single precision is not employed. Local attackers can conduct a cache-timing attack against public key operations. These attackers may already have obtained sensitive information if the affected system has been used for private key operations (e.g., signing with a private key).
References
Link | Resource |
---|---|
https://arxiv.org/abs/2008.12188 | Exploit Third Party Advisory |
https://github.com/wolfSSL/wolfssl/releases/tag/v4.5.0-stable | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-08-21T13:16:49
Updated: 2020-10-28T20:04:32
Reserved: 2020-06-26T00:00:00
Link: CVE-2020-15309
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-08-21T14:15:11.060
Modified: 2022-11-16T13:50:21.667
Link: CVE-2020-15309
JSON object: View
Redhat Information
No data.
CWE