Lucene search

K
cvelistOpensslCVELIST:CVE-2018-0737
HistoryApr 16, 2018 - 12:00 a.m.

CVE-2018-0737 Cache timing vulnerability in RSA Key Generation

2018-04-1600:00:00
openssl
www.cve.org
1

6.7 Medium

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.9%

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CNA Affected

[
  {
    "product": "OpenSSL",
    "vendor": "OpenSSL",
    "versions": [
      {
        "status": "affected",
        "version": "Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)"
      },
      {
        "status": "affected",
        "version": "Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o)"
      }
    ]
  }
]

References