#VU23452 Covert Timing Channel in Crypto++ - CVE-2022-48570,CVE-2019-14318

 

#VU23452 Covert Timing Channel in Crypto++ - CVE-2022-48570,CVE-2019-14318

Published: December 8, 2019 / Updated: October 4, 2023


Vulnerability identifier: #VU23452
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-48570,CVE-2019-14318
CWE-ID: CWE-385
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Crypto++
Software vendor:
cryptopp.com

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information within the timing side channel in ECDSA signature generation. A local user with ability to measure the duration of hundreds to thousands of signing operations can compute the private key used.


Remediation

Install update from vendor's website.

External links