An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,
such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
References
Link | Resource |
---|---|
https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable | Release Notes |
Configurations
History
20 Feb 2025, 21:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable - Release Notes | |
CWE | CWE-922 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
First Time |
Wolfssl wolfssl
Wolfssl |
|
CPE | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* |
27 Aug 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-27 19:15
Updated : 2025-02-20 21:10
NVD link : CVE-2024-5288
Mitre link : CVE-2024-5288
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-922
Insecure Storage of Sensitive Information