2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-4304" ,
"sourceIdentifier" : "openssl-security@openssl.org" ,
"published" : "2023-02-08T20:15:23.887" ,
2023-07-19 02:01:21 +00:00
"lastModified" : "2023-07-19T00:57:39.033" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Analyzed" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.9 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.0.2" ,
"versionEndExcluding" : "1.0.2zg" ,
"matchCriteriaId" : "70985D55-A574-4151-B451-4D500CBFC29A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.1.1" ,
"versionEndExcluding" : "1.1.1t" ,
"matchCriteriaId" : "DE0061D6-8F81-45D3-B254-82A94915FD08"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.0.0" ,
"versionEndExcluding" : "3.0.8" ,
"matchCriteriaId" : "A6DC5D88-4E99-48F2-8892-610ACA9B5B86"
}
]
}
]
2023-07-19 02:01:21 +00:00
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "7.2.40" ,
"matchCriteriaId" : "166DF690-041D-4585-A9DA-A6CC72A6A7F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:sslvpn:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.2.1" ,
"matchCriteriaId" : "DA7E0DD2-D62E-4735-A2C9-47C463BE4AA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.7.0" ,
"versionEndExcluding" : "2.7.11" ,
"matchCriteriaId" : "27B77023-4983-4D33-9824-A120A5ED31BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.8.0" ,
"versionEndExcluding" : "3.7.34" ,
"matchCriteriaId" : "8BD398C8-BC0B-4ED5-B71A-B9C6D8F63659"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.8.0" ,
"versionEndExcluding" : "3.11.22" ,
"matchCriteriaId" : "31B59634-B59C-4391-96D3-200A86A6CE3E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.0.0" ,
"versionEndExcluding" : "4.3.16" ,
"matchCriteriaId" : "F7794B42-8235-4C75-866F-5D0A405F0989"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.4.0" ,
"versionEndExcluding" : "4.6.3" ,
"matchCriteriaId" : "C8A23A5D-928A-4225-9C93-31E5DFE215A7"
}
]
}
]
2023-04-24 12:24:31 +02:00
}
] ,
"references" : [
{
"url" : "https://www.openssl.org/news/secadv/20230207.txt" ,
"source" : "openssl-security@openssl.org" ,
"tags" : [
"Vendor Advisory"
]
}
]
}