CVE-2019-13628

CVE-2019-13628

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without –enable-fpecc, –enable-sp, or –enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

Source: CVE-2019-13628

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다