SB2022071207 - Multiple vulnerabilities in wolfSSL



SB2022071207 - Multiple vulnerabilities in wolfSSL

Published: July 12, 2022

Security Bulletin ID SB2022071207
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2020-12966)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a Ciphertext side channel attack on ECC and DH operations in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local user with control over hypervisor can obtain sensitive data from the guest OS.


2) Cryptographic issues (CVE-ID: CVE-2021-46744)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a ciphertext side channel attack where data in specific cryptographic algorithms can be inferred in a SEV guest by monitoring the ciphertext values over time. A local user with access to the hypervisor can gain access to sensitive information, related to the guest OS.


3) Security features bypass (CVE-ID: CVE-2022-34293)

The vulnerability allows a remote attacker to perform DoS attack.

The vulnerability exists due to an implementation error in DTLS 1.0/1.2, which causes the return-routability check, intended to protect application against DoS attacks, to be wrongly skipped in a specific edge case. A remote attacker can perform a denial of service (DoS) attack by consuming excessive resources on the server.

Remediation

Install update from vendor's website.