1.8 KiB
CVE-2022-4304
Description
A timing based side channel exists in the OpenSSL RSA Decryption implementationwhich could be sufficient to recover a plaintext across a network in aBleichenbacher style attack. To achieve a successful decryption an attackerwould have to be able to send a very large number of trial messages fordecryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,RSA-OEAP and RSASVE.For example, in a TLS connection, RSA is commonly used by a client to send anencrypted pre-master secret to the server. An attacker that had observed agenuine connection between a client and a server could use this flaw to sendtrial messages to the server and record the time taken to process them. After asufficiently large number of messages the attacker could recover the pre-mastersecret used for the original connection and thus be able to decrypt theapplication data sent over that connection.
POC
Reference
No PoCs from references.
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/FairwindsOps/bif
- https://github.com/PajakAlexandre/wik-dps-tp02
- https://github.com/Trinadh465/Openssl-1.1.1g_CVE-2022-4304
- https://github.com/Tuttu7/Yum-command
- https://github.com/a23au/awe-base-images
- https://github.com/alexcowperthwaite/PasskeyScanner
- https://github.com/chnzzh/OpenSSL-CVE-lib
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/neo9/fluentd
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/stkcat/awe-base-images