CVE-2023-6935

wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure: --enable-all CFLAGS="-DWOLFSSL_STATIC_RSA" The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6.  Therefore the default build since 3.6.6, even with "--enable-all", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent. The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://people.redhat.com/~hkario/marvin/ - Technical Description () https://people.redhat.com/~hkario/marvin/ - Technical Description
References () https://www.wolfssl.com/docs/security-vulnerabilities/ - Vendor Advisory () https://www.wolfssl.com/docs/security-vulnerabilities/ - Vendor Advisory

07 Nov 2024, 20:41

Type Values Removed Values Added
First Time Wolfssl wolfssl
Wolfssl
References () https://people.redhat.com/~hkario/marvin/ - () https://people.redhat.com/~hkario/marvin/ - Technical Description
References () https://www.wolfssl.com/docs/security-vulnerabilities/ - () https://www.wolfssl.com/docs/security-vulnerabilities/ - Vendor Advisory
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Summary
  • (es) wolfSSL SP Math Toda la implementación de RSA es vulnerable al ataque Marvin, una nueva variación de un ataque de sincronización de estilo Bleichenbacher, cuando se construye con las siguientes opciones para configurar: --enable-all CFLAGS="-DWOLFSSL_STATIC_RSA" La definición "WOLFSSL_STATIC_RSA" habilita RSA estático conjuntos de cifrado, que no se recomienda y ha estado deshabilitado de forma predeterminada desde wolfSSL 3.6.6. Por lo tanto, la compilación predeterminada desde 3.6.6, incluso con "--enable-all", no es vulnerable al ataque Marvin. La vulnerabilidad es específica de los conjuntos de cifrado RSA estáticos y se espera que sea independiente del relleno. La vulnerabilidad permite a un atacante descifrar textos cifrados y falsificar firmas después de realizar una gran cantidad de observaciones de prueba. Sin embargo, la clave privada del servidor no está expuesta.

09 Feb 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 23:15

Updated : 2024-11-21 08:44


NVD link : CVE-2023-6935

Mitre link : CVE-2023-6935

CVE.ORG link : CVE-2023-6935


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-203

Observable Discrepancy