{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5288","assignerOrgId":"50d2cd11-d01a-48ed-9441-5bfce9d63b27","state":"PUBLISHED","assignerShortName":"wolfSSL","dateReserved":"2024-05-23T20:20:44.346Z","datePublished":"2024-08-27T18:36:28.555Z","dateUpdated":"2024-08-27T19:23:20.376Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"wolfSSL","repo":"https://github.com/wolfSSL/wolfssl","vendor":"wolfSSL Inc.","versions":[{"lessThanOrEqual":"5.7.0","status":"affected","version":"0","versionType":"git"}]}],"credits":[{"lang":"en","type":"finder","value":"Kemal Derya"},{"lang":"en","type":"finder","value":"M. Caner Tol"},{"lang":"en","type":"finder","value":"Berk Sunar"}],"datePublic":"2024-07-08T17:30:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. W<span style=\"background-color: rgb(255, 255, 255);\">hen </span><span style=\"background-color: rgb(255, 255, 255);\">WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,\n\nsuch as in server-side TLS connections, the connection is halted if any fault occurs.&nbsp;</span>The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.</span>"}],"value":"An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,\n\nsuch as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery."}],"impacts":[{"capecId":"CAPEC-624","descriptions":[{"lang":"en","value":"CAPEC-624 Fault Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.1,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-922","description":"CWE-922 Insecure Storage of Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"50d2cd11-d01a-48ed-9441-5bfce9d63b27","shortName":"wolfSSL","dateUpdated":"2024-08-27T18:36:28.555Z"},"references":[{"url":"https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable"}],"source":{"discovery":"EXTERNAL"},"title":"Safe-error attack on TLS 1.3 Protocol","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-27T19:22:54.638402Z","id":"CVE-2024-5288","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-27T19:23:20.376Z"}}]}}