Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-12886

Опубликовано: 30 сент. 2025
Источник: fstec
CVSS3: 6.5
CVSS2: 6.4
EPSS Низкий

Описание

Уязвимость компонента SM2 Handler криптографической библиотеки OpenSSL связана со cкрытым временным каналом. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, восстановить закрытый ключ

Вендор

OpenSSL Software Foundation
АО «СберТех»
АО "НППКТ"

Наименование ПО

OpenSSL
Platform V SberLinux OS Server
ОСОН ОСнова Оnyx

Версия ПО

до 3.5.4 (OpenSSL)
до 3.4.3 (OpenSSL)
до 3.3.5 (OpenSSL)
до 3.2.6 (OpenSSL)
9.2.0-fstec (Platform V SberLinux OS Server)
до 3.1 (ОСОН ОСнова Оnyx)

Тип ПО

Программное средство защиты
Операционная система

Операционные системы и аппаратные платформы

АО «СберТех» Platform V SberLinux OS Server 9.2.0-fstec
АО "НППКТ" ОСОН ОСнова Оnyx до 3.1

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,4)
Средний уровень опасности (базовая оценка CVSS 3.1 составляет 6,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://openssl-library.org/news/secadv/20250930.txt
Для ОСОН ОСнова Оnyx: Обновление программного обеспечения openssl до версии 3.5.1-1+deb13u1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 6%
0.00022
Низкий

6.5 Medium

CVSS3

6.4 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.5
ubuntu
6 месяцев назад

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker.. While remote key recovery over a network was not attempted by the reporter, timing measurements revealed a timing signal which may allow such an attack. OpenSSL does not directly support certificates with SM2 keys in TLS, and so this CVE is not relevant in most TLS contexts. However, given that it is possible to add support for such certificates via a custom provider, coupled with the fact that in such a custom provider context the private key may be recoverable via remote timing measurements, we consider this to be a Moderate severity issue. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as SM2 is not an approved algorithm.

CVSS3: 5.9
redhat
6 месяцев назад

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker.. While remote key recovery over a network was not attempted by the reporter, timing measurements revealed a timing signal which may allow such an attack. OpenSSL does not directly support certificates with SM2 keys in TLS, and so this CVE is not relevant in most TLS contexts. However, given that it is possible to add support for such certificates via a custom provider, coupled with the fact that in such a custom provider context the private key may be recoverable via remote timing measurements, we consider this to be a Moderate severity issue. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as SM2 is not an approved algorithm.

CVSS3: 6.5
nvd
6 месяцев назад

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker.. While remote key recovery over a network was not attempted by the reporter, timing measurements revealed a timing signal which may allow such an attack. OpenSSL does not directly support certificates with SM2 keys in TLS, and so this CVE is not relevant in most TLS contexts. However, given that it is possible to add support for such certificates via a custom provider, coupled with the fact that in such a custom provider context the private key may be recoverable via remote timing measurements, we consider this to be a Moderate severity issue. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as SM2 is not an approved algorithm.

msrc
2 месяца назад

Timing side-channel in SM2 algorithm on 64 bit ARM

CVSS3: 6.5
debian
6 месяцев назад

Issue summary: A timing side-channel which could potentially allow rem ...

EPSS

Процентиль: 6%
0.00022
Низкий

6.5 Medium

CVSS3

6.4 Medium

CVSS2