CVE-2024-0202

Plain English Summary

AI-powered analysis for quick understanding

An attacker can potentially decrypt sensitive data or forge signatures using a server's certificate if they can make many connections to a server running the cryptlib library with RSA key exchange enabled. However, this vulnerability is only relevant in specific testing scenarios and is not typically present in standard deployments.

Technical Description

A security vulnerability has been identified in the cryptlib cryptographic library when cryptlib is compiled with the support for RSA key exchange ciphersuites in TLS (by setting the USE_RSA_SUITES define), it will be vulnerable to the timing variant of the Bleichenbacher attack. An attacker that is able to perform a large number of connections to the server will be able to decrypt RSA ciphertexts or forge signatures using server's certificate. THIS CVE ID IS CURRENTLY DISPUTED - MAINTAINER NOTE: There are only two situations where it's enabled, one is for fuzz-testing to exercise code paths that wouldn't otherwise be available, the other is for static source code analysis with tools like Coverity and Prefast, again to open up code paths that otherwise wouldn't be available. It can also be enabled manually in two specific test builds just to make sure the code still compiles OK, to avoid bit rot and verify that the fuzz-testing build will compile without errors.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$828($500-$1K)
Vendor Response
Grade FPatched in 769 days

Quick Information

Published

Feb 5, 2024

about 2 years ago

Last Modified

Mar 16, 2026

22 days ago

Vendor

cryptlib

Product

cryptlib