Timing side channel in private key RSA operations.

Title

Timing side channel in private key RSA operations.

CVE

CVE-2024-23170

Date

10 January 2024

Affects

All versions of Mbed TLS up to and including 2.28.6 and 3.5.1

Impact

Potential recovery of plaintext

Severity

Medium

Credit

Hubert Kario (Red Hat)

Vulnerability

Mbed TLS is vulnerable to a timing side channel in private key RSA operations. This side channel could be sufficient for an attacker to recover the plaintext. A local attacker or a remote attacker who is close to the victim on the network might have precise enough timing measurements to exploit this. It requires the attacker to send a large number of messages for decryption. For details, see Everlasting ROBOT: the Marvin Attack, Hubert Kario (Red Hat).

Impact

An attacker meeting the conditions above could potentially recover the plaintext.

Resolution

Affected users will want to upgrade to Mbed TLS 3.5.2 or 2.28.7 depending on the branch they’re currently using.

Work-around

There is no known work-around. Affected users need to upgrade.