cve/2024/CVE-2024-5288.md
2024-08-30 20:52:42 +00:00

19 lines
995 B
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-5288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5288)
![](https://img.shields.io/static/v1?label=Product&message=wolfSSL&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%205.7.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information&color=brighgreen)
### Description
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/wolfSSL/Arduino-wolfSSL
- https://github.com/wolfSSL/wolfssl