CVE-2024-23170

EUVD-2024-20689
An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA-ADPADP
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
Affected Products (NVD)
VendorProductVersion
armmbed_tls
2.0.0 ≤
𝑥
< 2.28.7
armmbed_tls
3.0.0 ≤
𝑥
< 3.5.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
mbedtls
bookworm
no-dsa
bullseye
no-dsa
bullseye (security)
vulnerable
buster
no-dsa
forky
3.6.5-0.1
fixed
sid
3.6.5-0.1
fixed
trixie
3.6.4-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
mbedtls
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
mantic
ignored
noble
needs-triage
oracular
not-affected
plucky
not-affected
questing
not-affected
trusty
dne
xenial
needs-triage