Описание
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
Отчет
An attacker would have to be able to send a large number of trial messages to achieve successful decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OAEP, and RSASVE. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-385: Covert Timing Channel ->CWE-208: Observable Timing Discrepancy vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive configurations necessary for operational requirements. Baseline settings and configuration controls establish secure system and software configurations, while least functionality reduces the attack surface by disabling unnecessary components and limiting system complexity, which in turn minimizes variability in processing behavior that could expose timing discrepancies. Domain accounts are protected by lockout policies based on predefined thresholds, mitigating brute-force attempts and reducing the risk of credential inference through response timing analysis. Event logs are collected and processed for centralization, correlation, monitoring, alerting, and retention, supporting the detection of anomalous timing patterns that may indicate timing-based attacks. Static code analysis and peer reviews are used to enforce robust input validation and error handling, reducing the likelihood of introducing time-sensitive vulnerabilities. Additionally, process isolation and encryption of data at rest limit the impact of successful exploitation by containing compromised workloads and preventing unauthorized data access or leakage.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | libgcrypt | Not affected | ||
Red Hat Enterprise Linux 6 | libgcrypt | Out of support scope | ||
Red Hat Enterprise Linux 7 | libgcrypt | Affected | ||
Red Hat Enterprise Linux 8 | libgcrypt | Affected | ||
Red Hat Enterprise Linux 9 | libgcrypt | Fixed | RHSA-2024:9404 | 12.11.2024 |
Red Hat Enterprise Linux 9 | libgcrypt | Fixed | RHSA-2024:9404 | 12.11.2024 |
Red Hat Enterprise Linux 9.2 Extended Update Support | libgcrypt | Fixed | RHSA-2025:3534 | 02.04.2025 |
Red Hat Enterprise Linux 9.4 Extended Update Support | libgcrypt | Fixed | RHSA-2025:3530 | 02.04.2025 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
Связанные уязвимости
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
A timing-based side-channel flaw was found in libgcrypt's RSA implemen ...
EPSS
5.9 Medium
CVSS3