2023-07-19 02:01:21 +00:00

148 lines
5.5 KiB
JSON

{
"id": "CVE-2022-4304",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-08T20:15:23.887",
"lastModified": "2023-07-19T00:57:39.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.2",
"versionEndExcluding": "1.0.2zg",
"matchCriteriaId": "70985D55-A574-4151-B451-4D500CBFC29A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.1",
"versionEndExcluding": "1.1.1t",
"matchCriteriaId": "DE0061D6-8F81-45D3-B254-82A94915FD08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.8",
"matchCriteriaId": "A6DC5D88-4E99-48F2-8892-610ACA9B5B86"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2.40",
"matchCriteriaId": "166DF690-041D-4585-A9DA-A6CC72A6A7F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:sslvpn:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.1",
"matchCriteriaId": "DA7E0DD2-D62E-4735-A2C9-47C463BE4AA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.7.0",
"versionEndExcluding": "2.7.11",
"matchCriteriaId": "27B77023-4983-4D33-9824-A120A5ED31BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.8.0",
"versionEndExcluding": "3.7.34",
"matchCriteriaId": "8BD398C8-BC0B-4ED5-B71A-B9C6D8F63659"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8.0",
"versionEndExcluding": "3.11.22",
"matchCriteriaId": "31B59634-B59C-4391-96D3-200A86A6CE3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.3.16",
"matchCriteriaId": "F7794B42-8235-4C75-866F-5D0A405F0989"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.6.3",
"matchCriteriaId": "C8A23A5D-928A-4225-9C93-31E5DFE215A7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.openssl.org/news/secadv/20230207.txt",
"source": "openssl-security@openssl.org",
"tags": [
"Vendor Advisory"
]
}
]
}