Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-2236

Опубликовано: 06 мар. 2024
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

Отчет

An attacker would have to be able to send a large number of trial messages to achieve successful decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OAEP, and RSASVE. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-385: Covert Timing Channel ->CWE-208: Observable Timing Discrepancy vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive configurations necessary for operational requirements. Baseline settings and configuration controls establish secure system and software configurations, while least functionality reduces the attack surface by disabling unnecessary components and limiting system complexity, which in turn minimizes variability in processing behavior that could expose timing discrepancies. Domain accounts are protected by lockout policies based on predefined thresholds, mitigating brute-force attempts and reducing the risk of credential inference through response timing analysis. Event logs are collected and processed for centralization, correlation, monitoring, alerting, and retention, supporting the detection of anomalous timing patterns that may indicate timing-based attacks. Static code analysis and peer reviews are used to enforce robust input validation and error handling, reducing the likelihood of introducing time-sensitive vulnerabilities. Additionally, process isolation and encryption of data at rest limit the impact of successful exploitation by containing compromised workloads and preventing unauthorized data access or leakage.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libgcryptNot affected
Red Hat Enterprise Linux 6libgcryptOut of support scope
Red Hat Enterprise Linux 7libgcryptAffected
Red Hat Enterprise Linux 8libgcryptAffected
Red Hat Enterprise Linux 9libgcryptFixedRHSA-2024:940412.11.2024
Red Hat Enterprise Linux 9libgcryptFixedRHSA-2024:940412.11.2024
Red Hat Enterprise Linux 9.2 Extended Update SupportlibgcryptFixedRHSA-2025:353402.04.2025
Red Hat Enterprise Linux 9.4 Extended Update SupportlibgcryptFixedRHSA-2025:353002.04.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385->CWE-208
https://bugzilla.redhat.com/show_bug.cgi?id=2245218libgcrypt: vulnerable to Marvin Attack

EPSS

Процентиль: 42%
0.00196
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 1 года назад

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

CVSS3: 5.9
nvd
больше 1 года назад

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

CVSS3: 5.9
debian
больше 1 года назад

A timing-based side-channel flaw was found in libgcrypt's RSA implemen ...

suse-cvrf
5 дней назад

Security update for libgcrypt

suse-cvrf
5 дней назад

Security update for libgcrypt

EPSS

Процентиль: 42%
0.00196
Низкий

5.9 Medium

CVSS3