An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.
References
Configurations
History
21 Apr 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0 - Release Notes, Third Party Advisory | |
References | () https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2 - Release Notes, Third Party Advisory |
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-12-15 23:15
Updated : 2025-04-21 15:15
NVD link : CVE-2022-46392
Mitre link : CVE-2022-46392
JSON object : View
Products Affected
arm
- mbed_tls
fedoraproject
- fedora
CWE
CWE-203
Observable Discrepancy