Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2022-4304

Public on 2023-02-08
Modified on 2023-06-12
Description

A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE.

Severity
Medium
See what this means
CVSS v3 Base Score
7.4
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 1 openssl 2023-02-03 23:39 ALAS-2023-1683
Amazon Linux 2 - Core openssl 2023-02-03 19:19 ALAS2-2023-1935
Amazon Linux 2023 openssl 2023-02-17 20:48 ALAS2023-2023-101
Amazon Linux 2 - Openssl-snapsafe Extra openssl-snapsafe 2023-07-17 19:30 ALAS2OPENSSL-SNAPSAFE-2023-002
Amazon Linux 2 - Core openssl11 2023-02-03 19:19 ALAS2-2023-1934
Amazon Linux 2 - Core edk2 2024-03-13 20:26 ALAS2-2024-2502

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 7.4 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
NVD CVSSv3 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N