CVE-2022-4304

Public on 2023-02-08
Modified on 2024-05-17
Description
A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE.
Severity
Medium severity
Medium
CVSS v3 Base Score
7.4
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core edk2 2024-03-13 ALAS2-2024-2502 Fixed
Amazon Linux 1 openssl 2023-02-03 ALAS-2023-1683 Fixed
Amazon Linux 2 - Core openssl 2023-02-03 ALAS2-2023-1935 Fixed
Amazon Linux 2023 openssl 2023-02-17 ALAS2023-2023-101 Fixed
Amazon Linux 2 - Openssl-snapsafe Extra openssl-snapsafe 2023-07-17 ALAS2OPENSSL-SNAPSAFE-2023-002 Fixed
Amazon Linux 2 - Core openssl11 2023-02-03 ALAS2-2023-1934 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 7.4 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
NVD CVSSv3 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N