CVE-2024-5288

An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

20 Feb 2025, 21:10

Type Values Removed Values Added
References () https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable - () https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable - Release Notes
CWE CWE-922
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
First Time Wolfssl wolfssl
Wolfssl
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

27 Aug 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-27 19:15

Updated : 2025-02-20 21:10


NVD link : CVE-2024-5288

Mitre link : CVE-2024-5288


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-922

Insecure Storage of Sensitive Information