#VU104032 Information Exposure Through Timing Discrepancy in M2Crypto - CVE-2023-50781

 

#VU104032 Information Exposure Through Timing Discrepancy in M2Crypto - CVE-2023-50781

Published: February 18, 2025


Vulnerability identifier: #VU104032
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2023-50781
CWE-ID: CWE-208
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
M2Crypto
Software vendor:
Ng Pheng Siong

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to possibility of the Bleichenbacher timing attack in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. A remote attacker can gain access to sensitive information.

Note, the vulnerability exists due ti incomplete fix for #VU65771 (CVE-2020-25657).


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

The vulnerability is partially solved with OpenSSL update if the default provider is in use (e.g. won't help with pkcs11 provider).


External links