An issue was discovered in wolfSSL before 4.5.0, when single precision is not employed. Local attackers can conduct a cache-timing attack against public key operations. These attackers may already have obtained sensitive information if the affected system has been used for private key operations (e.g., signing with a private key).
References
Link Resource
https://arxiv.org/abs/2008.12188 Exploit Third Party Advisory
https://github.com/wolfSSL/wolfssl/releases/tag/v4.5.0-stable Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-08-21T13:16:49

Updated: 2020-10-28T20:04:32

Reserved: 2020-06-26T00:00:00


Link: CVE-2020-15309

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-08-21T14:15:11.060

Modified: 2022-11-16T13:50:21.667


Link: CVE-2020-15309

JSON object: View

cve-icon Redhat Information

No data.

CWE