CVE-2021-4160

There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
opensslCNA
---
---
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 44%
VendorProductVersion
opensslopenssl
1.0.2 ≤
𝑥
≤ 1.0.2zb
opensslopenssl
1.1.1 ≤
𝑥
< 1.1.1m
opensslopenssl
3.0.0
opensslopenssl
3.0.0:alpha1
opensslopenssl
3.0.0:alpha10
opensslopenssl
3.0.0:alpha11
opensslopenssl
3.0.0:alpha12
opensslopenssl
3.0.0:alpha13
opensslopenssl
3.0.0:alpha14
opensslopenssl
3.0.0:alpha15
opensslopenssl
3.0.0:alpha16
opensslopenssl
3.0.0:alpha17
opensslopenssl
3.0.0:alpha2
opensslopenssl
3.0.0:alpha3
opensslopenssl
3.0.0:alpha4
opensslopenssl
3.0.0:alpha5
opensslopenssl
3.0.0:alpha6
opensslopenssl
3.0.0:alpha7
opensslopenssl
3.0.0:alpha8
opensslopenssl
3.0.0:alpha9
opensslopenssl
3.0.0:beta1
opensslopenssl
3.0.0:beta2
debiandebian_linux
9.0
debiandebian_linux
10.0
debiandebian_linux
11.0
oraclehealth_sciences_inform_publisher
6.2.1.1
oraclehealth_sciences_inform_publisher
6.3.1.1
oraclejd_edwards_enterpriseone_tools
9.2.6.3
oraclepeoplesoft_enterprise_peopletools
8.58
oraclepeoplesoft_enterprise_peopletools
8.59
siemenssinec_ins
𝑥
< 1.0
siemenssinec_ins
1.0
siemenssinec_ins
1.0:sp1
oracleenterprise_manager_ops_center
12.4.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
stretch
ignored
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
needed
trusty
dne
nodejs
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl1.0
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
focal
dne
bionic
not-affected
xenial
dne
trusty
dne