CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
9.5%
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connections, the connection is halted if any fault occurs.Β The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wolfssl | <=Β 5.5.4-2+deb12u1 | wolfssl_5.5.4-2+deb12u1_all.deb |
Debian | 11 | all | wolfssl | <=Β 4.6.0+p1-0+deb11u2 | wolfssl_4.6.0+p1-0+deb11u2_all.deb |
Debian | 999 | all | wolfssl | <Β 5.7.2-0.1 | wolfssl_5.7.2-0.1_all.deb |
Debian | 13 | all | wolfssl | <Β 5.7.2-0.1 | wolfssl_5.7.2-0.1_all.deb |
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
9.5%