Description
The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
Published: 2024-08-29
Score: 4.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-17290 The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
History

Wed, 04 Sep 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl wolfssl
Weaknesses CWE-203
CPEs cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Vendors & Products Wolfssl wolfssl

Fri, 30 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wolfssl
Wolfssl wolfcrypt
CPEs cpe:2.3:a:wolfssl:wolfcrypt:*:*:*:*:*:*:*:*
Vendors & Products Wolfssl
Wolfssl wolfcrypt
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Aug 2024 23:00:00 +0000

Type Values Removed Values Added
Description The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
Title AES T-Table sub-cache-line leakage
Weaknesses CWE-208
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wolfssl Wolfcrypt Wolfssl
cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2024-08-30T14:19:32.248Z

Reserved: 2024-02-15T17:34:06.930Z

Link: CVE-2024-1543

cve-icon Vulnrichment

Updated: 2024-08-30T14:19:11.271Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-29T23:15:10.067

Modified: 2024-09-04T14:26:29.407

Link: CVE-2024-1543

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses