Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-5981

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-28 Nov, 2023 | 11:49
Updated At-23 Nov, 2024 | 00:09
Rejected At-
Credits

Gnutls: timing side-channel in the rsa-psk authentication

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:28 Nov, 2023 | 11:49
Updated At:23 Nov, 2024 | 00:09
Rejected At:
▼CVE Numbering Authority (CNA)
Gnutls: timing side-channel in the rsa-psk authentication

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Affected Products
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/a:redhat:enterprise_linux:8::appstream
  • cpe:/o:redhat:enterprise_linux:8::baseos
Default Status
affected
Versions
Unaffected
  • From 0:3.6.16-8.el8_9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/a:redhat:enterprise_linux:8::appstream
  • cpe:/o:redhat:enterprise_linux:8::baseos
Default Status
affected
Versions
Unaffected
  • From 0:3.6.16-8.el8_9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/a:redhat:rhel_eus:8.6::appstream
  • cpe:/o:redhat:rhel_eus:8.6::baseos
Default Status
affected
Versions
Unaffected
  • From 0:3.6.16-5.el8_6.2 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/o:redhat:rhel_eus:8.8::baseos
  • cpe:/a:redhat:rhel_eus:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 0:3.6.16-7.el8_8.1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/o:redhat:enterprise_linux:9::baseos
  • cpe:/a:redhat:enterprise_linux:9::appstream
Default Status
affected
Versions
Unaffected
  • From 0:3.7.6-23.el9_3.3 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/o:redhat:enterprise_linux:9::baseos
  • cpe:/a:redhat:enterprise_linux:9::appstream
Default Status
affected
Versions
Unaffected
  • From 0:3.7.6-23.el9_3.3 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/a:redhat:rhel_eus:9.2::appstream
  • cpe:/o:redhat:rhel_eus:9.2::baseos
Default Status
affected
Versions
Unaffected
  • From 0:3.7.6-21.el9_2.1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/cephcsi-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-37 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/mcg-core-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-68 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/mcg-operator-bundle
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-158 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/mcg-rhel9-operator
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-39 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/ocs-client-console-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-58 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/ocs-client-operator-bundle
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-158 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/ocs-client-rhel9-operator
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-13 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/ocs-metrics-exporter-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-81 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/ocs-operator-bundle
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-158 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/ocs-rhel9-operator
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-79 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-cli-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-22 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-console-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-57 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-cosi-sidecar-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-csi-addons-operator-bundle
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-158 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-csi-addons-rhel9-operator
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-15 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-csi-addons-sidecar-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-15 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-multicluster-console-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-54 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-multicluster-operator-bundle
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-158 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-multicluster-rhel9-operator
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-10 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-must-gather-rhel9
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-26 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-operator-bundle
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-158 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odf-rhel9-operator
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-19 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odr-cluster-operator-bundle
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-158 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odr-hub-operator-bundle
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-158 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/odr-rhel9-operator
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-21 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHODF-4.15-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
odf4/rook-ceph-rhel9-operator
CPEs
  • cpe:/a:redhat:openshift_data_foundation:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-103 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/cluster-logging-operator-bundle
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.6-22 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/cluster-logging-rhel9-operator
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.6-11 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/elasticsearch6-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v6.8.1-407 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/elasticsearch-operator-bundle
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.6-19 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/elasticsearch-proxy-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v1.0.0-479 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/elasticsearch-rhel9-operator
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.6-7 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/eventrouter-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v0.4.0-247 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/fluentd-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.6-5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/log-file-metric-exporter-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v1.1.0-227 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/logging-curator5-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.1-470 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/logging-loki-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v2.9.6-14 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/logging-view-plugin-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.6-2 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/loki-operator-bundle
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.6-24 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/loki-rhel9-operator
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v5.8.6-10 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/lokistack-gateway-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v0.1.0-525 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/opa-openshift-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v0.1.0-224 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.8-RHEL-9
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/vector-rhel9
CPEs
  • cpe:/a:redhat:logging:5.8::el9
Default Status
affected
Versions
Unaffected
  • From v0.28.1-56 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/o:redhat:enterprise_linux:6
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gnutls
CPEs
  • cpe:/o:redhat:enterprise_linux:7
Default Status
unknown
Problem Types
TypeCWE IDDescription
CWECWE-203Observable Discrepancy
Type: CWE
CWE ID: CWE-203
Description: Observable Discrepancy
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Red Hat severity rating
value:
Moderate
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

To address the issue found upgrade to GnuTLS 3.8.2 or later versions.

Exploits

Credits

This issue was discovered by Daiki Ueno (Red Hat).
Timeline
EventDate
Reported to Red Hat.2023-11-07 00:00:00
Made public.2023-11-15 00:00:00
Event: Reported to Red Hat.
Date: 2023-11-07 00:00:00
Event: Made public.
Date: 2023-11-15 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2024:0155
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0319
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0399
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0451
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0533
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:1383
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:2094
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2023-5981
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2248445
issue-tracking
x_refsource_REDHAT
https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0155
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0319
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0399
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0451
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0533
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1383
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2094
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2023-5981
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2248445
Resource:
issue-tracking
x_refsource_REDHAT
Hyperlink: https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2024/01/19/3
x_transferred
https://access.redhat.com/errata/RHSA-2024:0155
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:0319
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:0399
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:0451
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:0533
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:1383
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:2094
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/security/cve/CVE-2023-5981
vdb-entry
x_refsource_REDHAT
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=2248445
issue-tracking
x_refsource_REDHAT
x_transferred
https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/01/19/3
Resource:
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0155
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0319
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0399
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0451
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0533
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1383
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2094
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/security/cve/CVE-2023-5981
Resource:
vdb-entry
x_refsource_REDHAT
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2248445
Resource:
issue-tracking
x_refsource_REDHAT
x_transferred
Hyperlink: https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:28 Nov, 2023 | 12:15
Updated At:08 Jul, 2024 | 18:15

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

GNU
gnu
>>gnutls>>1.5.0
cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>linux>>8.0
cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>linux>>9.0
cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>37
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>38
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE-203Secondarysecalert@redhat.com
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-203
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2024/01/19/3secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:0155secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:0319secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:0399secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:0451secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:0533secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:1383secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:2094secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2023-5981secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2248445secalert@redhat.com
Issue Tracking
Third Party Advisory
https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23secalert@redhat.com
Issue Tracking
Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/secalert@redhat.com
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/secalert@redhat.com
N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/01/19/3
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0155
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0319
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0399
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0451
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0533
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1383
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2094
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2023-5981
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2248445
Source: secalert@redhat.com
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
Source: secalert@redhat.com
Resource:
Issue Tracking
Vendor Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

160Records found

CVE-2018-10844
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.27% / 49.96%
||
7 Day CHG~0.00%
Published-22 Aug, 2018 | 13:00
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

Action-Not Available
Vendor-[UNKNOWN]Canonical Ltd.GNUFedora ProjectRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_workstationfedoragnutlsenterprise_linux_desktopgnutls
CWE ID-CWE-385
Covert Timing Channel
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2020-6750
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.59% / 68.14%
||
7 Day CHG~0.00%
Published-09 Jan, 2020 | 19:23
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity, even though there is no technical barrier to a direct connection. NOTE: versions before 2.60 are unaffected.

Action-Not Available
Vendor-n/aThe GNOME ProjectFedora Project
Product-fedoraglibn/a
CVE-2023-27536
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 1.51%
||
7 Day CHG+0.01%
Published-30 Mar, 2023 | 00:00
Updated-14 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

Action-Not Available
Vendor-n/aCURLFedora ProjectSplunk LLC (Cisco Systems, Inc.)Debian GNU/LinuxNetApp, Inc.
Product-h700sh500sontapdebian_linuxlibcurlh300sh500s_firmwareuniversal_forwarderh300s_firmwareh410s_firmwareactive_iq_unified_managerfedorah700s_firmwareh410shttps://github.com/curl/curl
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CVE-2023-27535
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.05% / 15.21%
||
7 Day CHG~0.00%
Published-30 Mar, 2023 | 00:00
Updated-09 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectDebian GNU/LinuxSplunk LLC (Cisco Systems, Inc.)CURL
Product-debian_linuxh700sh300sontap_9h410s_firmwareuniversal_forwarderfedorah300s_firmwareh700s_firmwareh500sh500s_firmwarelibcurlactive_iq_unified_managerh410shttps://github.com/curl/curl
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CVE-2023-22863
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 4.31%
||
7 Day CHG~0.00%
Published-18 Jan, 2023 | 18:46
Updated-03 Apr, 2025 | 19:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Robotic Process Automation information disclosure

IBM Robotic Process Automation 20.12.0 through 21.0.2 defaults to HTTP in some RPA commands when the prefix is not explicitly specified in the URL. This could allow an attacker to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 244109.

Action-Not Available
Vendor-Microsoft CorporationIBM CorporationRed Hat, Inc.
Product-robotic_process_automationrobotic_process_automation_as_a_serviceopenshiftwindowsrobotic_process_automation_for_cloud_pakRobotic Process Automation
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-1419
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.15% / 36.52%
||
7 Day CHG~0.00%
Published-17 Nov, 2024 | 10:20
Updated-18 Nov, 2024 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Debezium: script injection via connector parameter

A script injection vulnerability was found in the Debezium database connector, where it does not properly sanitize some parameters. This flaw allows an attacker to send a malicious request to inject a parameter that may allow the viewing of unauthorized data.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Integration Change Data CaptureRed Hat build of Debezium
CWE ID-CWE-233
Improper Handling of Parameters
CVE-2016-10027
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.39% / 59.09%
||
7 Day CHG~0.00%
Published-12 Jan, 2017 | 23:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the XMPP library in Smack before 4.1.9, when the SecurityMode.required TLS setting has been set, allows man-in-the-middle attackers to bypass TLS protections and trigger use of cleartext for client authentication by stripping the "starttls" feature from a server response.

Action-Not Available
Vendor-igniterealtimen/aFedora Project
Product-fedorasmackn/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-28972
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.53% / 66.10%
||
7 Day CHG~0.00%
Published-27 Feb, 2021 | 00:00
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.

Action-Not Available
Vendor-saltstackn/aDebian GNU/LinuxFedora Project
Product-debian_linuxfedorasaltn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-25658
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.23% / 46.00%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 13:48
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.

Action-Not Available
Vendor-python-rsa_projectSybren A. StüvelRed Hat, Inc.Fedora Project
Product-openstack_platformfedorapython-rsapython-rsa
CWE ID-CWE-385
Covert Timing Channel
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2020-25657
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.41% / 60.28%
||
7 Day CHG~0.00%
Published-12 Jan, 2021 | 14:33
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.

Action-Not Available
Vendor-m2crypto_projectn/aRed Hat, Inc.Fedora Project
Product-m2cryptovirtualizationfedoraenterprise_linuxm2crypto
CWE ID-CWE-385
Covert Timing Channel
CVE-2020-1758
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.25% / 48.55%
||
7 Day CHG~0.00%
Published-15 May, 2020 | 18:52
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack.

Action-Not Available
Vendor-Red Hat, Inc.
Product-keycloakopenstackkeycloak
CWE ID-CWE-297
Improper Validation of Certificate with Host Mismatch
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-13254
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-10.76% / 93.05%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 13:11
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.DjangoNetApp, Inc.Oracle CorporationFedora Project
Product-ubuntu_linuxdebian_linuxfedorazfs_storage_appliance_kitdjangosra_pluginsteelstore_cloud_integrated_storagen/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-13614
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.58% / 67.90%
||
7 Day CHG~0.00%
Published-26 May, 2020 | 22:08
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.

Action-Not Available
Vendor-axel_projectn/aopenSUSEFedora Project
Product-fedoraaxelbackports_sleleapn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-39272
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 29.98%
||
7 Day CHG~0.00%
Published-30 Aug, 2021 | 05:05
Updated-04 Aug, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.

Action-Not Available
Vendor-fetchmailn/aFedora Project
Product-fedorafetchmailn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-32791
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.26% / 49.18%
||
7 Day CHG+0.03%
Published-26 Jul, 2021 | 00:00
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hardcoded static IV and AAD with a reused key in AES GCM encryption in mod_auth_openidc

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.

Action-Not Available
Vendor-openidczmartzoneThe Apache Software FoundationFedora Project
Product-mod_auth_openidchttp_serverfedoramod_auth_openidc
CWE ID-CWE-323
Reusing a Nonce, Key Pair in Encryption
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2024-31497
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-22.84% / 95.68%
||
7 Day CHG~0.00%
Published-15 Apr, 2024 | 00:00
Updated-27 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.

Action-Not Available
Vendor-tortoisegitputtytigriswinscpfilezilla-projectn/aputtyFedora Project
Product-puttyfilezilla_clienttortoisegitwinscptortoisesvnfedoran/aputty
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2017-5107
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-5.3||MEDIUM
EPSS-0.59% / 68.11%
||
7 Day CHG~0.00%
Published-27 Oct, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A timing attack in SVG rendering in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to extract pixel values from a cross-origin page being iframe'd via a crafted HTML page.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncRed Hat, Inc.Apple Inc.Microsoft CorporationGoogle LLC
Product-chromeenterprise_linux_desktopenterprise_linux_workstationlinux_kernelenterprise_linux_servermacoswindowsGoogle Chrome prior to 60.0.3112.78 for Linux, Windows and Mac
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-12402
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 5.31%
||
7 Day CHG~0.00%
Published-09 Jul, 2020 | 14:53
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

Action-Not Available
Vendor-Debian GNU/LinuxopenSUSEFedora ProjectMozilla Corporation
Product-firefoxdebian_linuxfedoraleapFirefox
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-10932
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.03% / 5.72%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 00:00
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. An attacker that can get precise enough side-channel measurements can recover the long-term ECDSA private key by (1) reconstructing the projective coordinate of the result of scalar multiplication by exploiting side channels in the conversion to affine coordinates; (2) using an attack described by Naccache, Smart, and Stern in 2003 to recover a few bits of the ephemeral scalar from those projective coordinates via several measurements; and (3) using a lattice attack to get from there to the long-term ECDSA private key used for the signatures. Typically an attacker would have sufficient access when attacking an SGX enclave and controlling the untrusted OS.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedoran/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-203
Observable Discrepancy
CVE-2013-1620
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.59% / 68.30%
||
7 Day CHG~0.00%
Published-08 Feb, 2013 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

Action-Not Available
Vendor-n/aMozilla CorporationRed Hat, Inc.Oracle CorporationCanonical Ltd.
Product-iplanet_web_proxy_serveropenssoenterprise_linux_serverenterprise_linux_server_ausiplanet_web_servertraffic_directorenterprise_linux_eusenterprise_manager_ops_centerubuntu_linuxenterprise_linux_desktopglassfish_communications_servervm_serverenterprise_linux_workstationnetwork_security_servicesglassfish_servern/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-40982
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.42% / 61.03%
||
7 Day CHG+0.03%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aRed Hat, Inc.Xen ProjectNetApp, Inc.Intel CorporationDebian GNU/Linux
Product-xeon_d-2796texeon_w-1350_firmwarecore_i7-11850he_firmwarecore_i5-1035g7core_i3-8350k_firmwarecore_i3-9350k_firmwareceleron_5305ucore_i9-9990xe_firmwarepentium_gold_g6600_firmwarexeon_e-2314xeon_w-2125core_i9-10940xpentium_gold_g6400t_firmwarexeon_gold_5217_firmwarecore_i5-11600_firmwarexeon_d-2163it_firmwarecore_i7-1060g7_firmwarecore_i7-9700xeon_gold_6240_firmwarexeon_gold_6234core_i9-9900kfxeon_w-1250p_firmwarepentium_gold_g5400txeon_gold_6238rcore_i5-1035g4xeon_w-2255core_i5-10400hcore_i7-10700k_firmwarexeon_w-11555mlecore_i5-9600t_firmwarecore_i9-9940x_firmwarecore_i3-10100yxeon_gold_6248_firmwarecore_i5-10400tcore_i7-11370hcore_i5-10310ucore_i9-7920xcore_i7-7600ucore_i5-9400f_firmwarexeon_e-2224core_i7-10700t_firmwarexeon_gold_5218core_i3-7100ecore_i5-11600tcore_i9-7940x_firmwarecore_i5-8269u_firmwarexeon_e3-1505l_v6xeon_e-2278gexeon_platinum_8380hxeon_gold_5220r_firmwarexeon_d-2173it_firmwarexeon_w-2245pentium_6405u_firmwarexeon_d-1746tercore_i3-7120t_firmwarecore_i5-10400all_flash_fabric-attached_storage_8700pentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwarecore_i9-9940xcore_i5-11600xeon_gold_6240celeron_5305u_firmwareall_flash_fabric-attached_storage_9500pentium_gold_g6405t_firmwarecore_i5-8600core_i5-9400_firmwarexeon_d-2177nt_firmwareceleron_5205ucore_i7-8500y_firmwarecore_i7-7740x_firmwarecore_i7-1060g7xeon_gold_5220s_firmwarecore_i9-10900core_i5-11600k_firmwarexeon_e-2374g_firmwareceleron_g4900tcore_i3-10100txeon_w-1390t_firmwarexeon_gold_5220rxeon_d-2733nt_firmwarecore_i9-10900kxeon_e-2386gcore_i3-10325_firmwarexeon_d-2146ntxeon_gold_6230_firmwarecore_i5-8600kcore_i9-10900fcore_i7-8700k_firmwarecore_i5-11500t_firmwarexeon_w-2223_firmwarecore_i7-8750hcore_i3-10105t_firmwarecore_i9-9960x_firmwarexeon_e-2226ge_firmwarecore_i3-7100u_firmwarecore_i5-10400_firmwarecore_i3-1115gre_firmwarexeon_d-2166ntxeon_e3-1270_v6xeon_d-1732te_firmwarecore_i7-1180g7_firmwarecore_i3-1125g4xeon_gold_6328h_firmwarexeon_silver_4216xeon_gold_6230xeon_w-2195core_i7-7820eq_firmwarexeon_e-2276gxeon_w-1290p_firmwarecore_i3-1000g4xeon_gold_5317core_i5-7267u_firmwarexeon_d-2183itxeon_gold_6348h_firmwarecore_i3-7100core_i7-8809gxeon_gold_6246r_firmwarecore_i5-10400h_firmwarexeon_e3-1230_v6_firmwarecore_i5-10500_firmwarepentium_gold_g6505core_i5-7267uceleron_g5900t_firmwarexeon_gold_5320txeon_silver_4208core_i5-9400txeon_w-2123xeon_gold_5220score_i5-8300hxeon_platinum_9282core_i5-8600t_firmwarexeon_e3-1220_v6_firmwarecore_i3-10110ycore_i5-10600kfxeon_platinum_9242_firmwarexeon_e3-1535m_v6_firmwarexeon_gold_6240r_firmwarexeon_silver_4210xeon_platinum_8256_firmwarecore_i5-11600kfcore_i7-9800xcore_i7-11700kfpentium_gold_g5500tcore_i7-10870hxeon_w-11555mre_firmwarecore_i5-8600_firmwarexeon_silver_4215r_firmwarecore_i5-9600kf_firmwarexeon_silver_4310_firmwareceleron_g4920xeon_e-2274gcore_i5-11500tcore_i5-9500xeon_e-2278gelcore_i7-7740xxeon_silver_4310tcore_i5-1130g7_firmwarexeon_e3-1280_v6_firmwarexeon_gold_6230t_firmwaredebian_linuxcore_i5-8300h_firmwarexeon_silver_4208_firmwarexeon_platinum_8268xeon_e-2136_firmwareall_flash_fabric-attached_storage_c400core_i7-8565ucore_i9-9980xe_firmwarexeon_e-2274g_firmwarecore_i3-10300_firmwarecore_i7-7560ucore_i9-11900fcore_i5-8259ucore_i3-8100t_firmwareceleron_g5900txeon_w-1250_firmwarecore_i7-11600hpentium_gold_g5500xeon_w-3265m_firmwarexeon_w-11555mle_firmwarecore_i7-8850h_firmwarexeon_e-2336core_i7-9700kf_firmwarecore_i9-7900x_firmwarecore_i3-10105pentium_gold_g6405_firmwarexeon_gold_5218_firmwarecore_i5-7600tpentium_gold_g6500_firmwarecore_i9-10900k_firmwarexeon_w-1270_firmwarexeon_e-2224gxeon_w-2135xeon_silver_4316_firmwarecore_i7-1185g7_firmwarecore_i5-11320hxeon_e-2226gecore_i3-10300t_firmwarepentium_6405upentium_gold_g6500core_i3-7167u_firmwarecore_i7-8559u_firmwarexeon_gold_5220t_firmwarecore_i9-10920x_firmwarecore_i7-8086k_firmwarecore_i7-10610uxeon_gold_5220_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwareall_flash_fabric-attached_storage_c250core_i7-8500ycore_i9-9900txeon_gold_6208u_firmwarecore_i3-7310t_firmwarexeon_platinum_8360hxeon_w-1390pxeon_gold_6250_firmwarecore_i5-11300h_firmwarecore_i3-8300t_firmwarecore_i5-7400_firmwarecore_i3-8109u_firmwarexeon_gold_6254_firmwarecore_i7-9700k_firmwarecore_i9-10980xe_firmwarexeon_e-2288g_firmwarexeon_silver_4310core_i5-1145g7e_firmwarexeon_gold_6258r_firmwarecore_i3-10300txeon_silver_4314_firmwarecore_i3-7101ecore_i3-8100b_firmwarecore_i9-7900xcore_i9-8950hk_firmwarexeon_gold_6209uxeon_w-3223pentium_gold_g6600xeon_w-2235_firmwarecore_i5-8265uxeon_platinum_8376h_firmwarepentium_gold_g6605celeron_g5925pentium_gold_g5400t_firmwarexeon_e-2286g_firmwarexeon_d-2183it_firmwarecore_i3-8350kcore_i7-10700_firmwarecore_i5-7500txeon_e3-1505m_v6core_i3-9100core_i5-9600k_firmwarexeon_platinum_9282_firmwarexeon_e-2224g_firmwarepentium_gold_g5600xeon_gold_5220tcore_i5-1145gre_firmwarexeon_platinum_8276lcore_i7-7700kcore_i7-8705gxeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-8706gxeon_w-3225xeon_w-1370core_i7-8700t_firmwarecore_i7-1185grecore_i7-11375hxeon_e3-1240_v6core_i7-8700core_i5-10400fcore_i5-8259u_firmwarexeon_w-2155_firmwarecore_i7-1068g7xeon_platinum_8380h_firmwarecore_i7-8705g_firmwarexeon_d-1746ter_firmwarecore_i3-7100tcore_i7-7700tcore_i7-10700txeon_w-3225_firmwarecore_i5-10210uxeon_w-2295core_i5-7260u_firmwarecore_i5-7600k_firmwarecore_i5-8257ucore_i7-8700kpentium_gold_g6405tcore_i5-1155g7_firmwarexeon_silver_4316xeon_e3-1270_v6_firmwarecore_i5-7442eqcore_i7-10510u_firmwarexeon_gold_5215xeon_d-2143itxeon_e-2226g_firmwarecore_i3-10100_firmwarexeon_gold_6244_firmwarexeon_e3-1285_v6core_i5-10505xeon_d-2161i_firmwarecore_i5-1030g7xeon_e3-1225_v6core_i5-7442eq_firmwarecore_i7-8569u_firmwarexeon_e-2144g_firmwarexeon_bronze_3206r_firmwarexeon_silver_4215rcore_i7-1185g7e_firmwarecore_i3-10110ucore_i5-10600kf_firmwarecore_i7-11800hxeon_gold_6330xeon_silver_4210txeon_gold_6212u_firmwarecore_i5-10310u_firmwarexeon_gold_6212uxeon_silver_4310t_firmwarecore_i9-7980xexeon_gold_6240l_firmwarexeon_d-2123it_firmwareceleron_g4900t_firmwarecore_i3-10105fcore_i3-8100hcore_i3-7310tcore_i9-11950hxeon_e-2386g_firmwarecore_i5-10300hxeon_gold_6238lxeon_platinum_8353hxeon_w-11865mlecore_i3-1005g1_firmwarecore_i5-7300uxeon_e3-1505l_v6_firmwarecore_i5-8500txeon_w-3265mcore_i5-7500xeon_gold_5320hxeon_platinum_8260y_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kcore_i5-8350u_firmwarexeon_d-2796te_firmwarexeon_gold_6338txeon_gold_6240y_firmwarecore_i9-10850kpentium_gold_g5600_firmwareceleron_g5905_firmwarexeon_e-2314_firmwarecore_i9-9900ks_firmwarepentium_gold_g6400tcore_i5-8400tcore_i3-9300_firmwarexeon_d-2145nt_firmwarexeon_w-1270pcore_i7-10700core_i7-11600h_firmwarecore_i9-10920xxeon_d-2712txeon_w-1290_firmwarecore_i7-10750h_firmwareceleron_g4920_firmwarecore_i3-10105tcore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i3-7101te_firmwarecore_i7-10875hxeon_platinum_8356hpentium_gold_g5400_firmwarecore_i9-11900k_firmwarecore_i3-10100core_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwaremicrocodecore_i5-7640x_firmwarexeon_gold_5318h_firmwarexeon_silver_4214y_firmwarecore_i5-9400core_i3-8100txeon_d-2733ntxeon_platinum_8260core_i3-7120txeon_bronze_3204_firmwarexeon_gold_5320h_firmwarexeon_d-2142it_firmwarecore_i5-7500t_firmwarecore_i7-8650uxeon_bronze_3204xeon_silver_4314core_i5-1145grexeon_gold_6246rxeon_w-11865mrexeon_gold_5217xeon_e-2234_firmwarecore_i3-7320t_firmwarecore_i5-11260h_firmwarexeon_gold_5222_firmwarexeon_w-3245core_i3-10110y_firmwarecore_i5-1035g4_firmwarecore_i5-8500bcore_i7-1185g7core_i7-1195g7core_i5-8269uxeon_e-2288gcore_i7-8709g_firmwarecore_i7-11700_firmwarexeon_gold_6240yxeon_w-1270p_firmwarecore_i5-11500he_firmwarexeon_w-2195_firmwarexeon_gold_6208ucore_i5-8279u_firmwarecore_i5-1145g7_firmwarecore_i5-9500f_firmwarecore_i5-10600t_firmwarexeon_gold_6252n_firmwarecore_i5-10210y_firmwarecore_i3-7350kxeon_w-2265_firmwarexeon_gold_6230r_firmwarecore_i5-8250ucore_i3-10305celeron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700txeon_w-1370p_firmwarecore_i7-7820eqxeon_gold_6252nxeon_gold_6244xeon_w-1290t_firmwarexeon_gold_6330_firmwarecore_i7-8650u_firmwarexeon_w-3245_firmwarexeon_gold_6226_firmwarecore_i3-9350kfxeon_w-1370pcore_i9-9900k_firmwarecore_i7-7700k_firmwarexeon_w-2135_firmwarecore_i3-1115g4e_firmwarecore_i5-1130g7xeon_platinum_8354h_firmwarexeon_platinum_8256xeon_gold_6238l_firmwarecore_i9-9900xxeon_gold_5318hxeon_w-2125_firmwarecore_i5-8365u_firmwarecore_i5-10500hxeon_w-2175_firmwarexeon_e3-1275_v6core_i9-9990xecore_i3-9300txeon_gold_6262v_firmwarexeon_e-2278gxeon_platinum_8260ycore_i3-8100h_firmwarecore_i3-1115g4_firmwarexeon_w-1370_firmwarecore_i9-9980xecore_i7-10875h_firmwarexeon_d-2142itcore_i5-10500t_firmwarexeon_silver_4210t_firmwarecore_i5-8265u_firmwarexeon_e-2374gcore_i9-10900x_firmwarexeon_e3-1505m_v6_firmwarecore_i5-10600all_flash_fabric-attached_storage_8300xeon_platinum_8276core_i3-1115g4ecore_i3-9350kxeon_w-1350core_i5-8500_firmwarexeon_w-11155mle_firmwarecore_i9-11980hk_firmwarecore_i5-1145g7ecore_i7-7700t_firmwarexeon_gold_5320t_firmwarexeon_w-3275_firmwarecore_i5-11500hecore_i3-10320core_i5-8200yxeon_w-2275celeron_g4900_firmwarexeon_e-2144gxeon_e3-1245_v6_firmwarexeon_w-1350pcore_i9-10940x_firmwarexeon_gold_6230rcore_i7-8569uall_flash_fabric-attached_storage_500fxencore_i7-7700_firmwarecore_i5-10500txeon_d-1712tr_firmwarexeon_platinum_8353h_firmwarecore_i7-1185g7exeon_gold_5218rxeon_gold_5318yxeon_bronze_3206rxeon_gold_6226rcore_i3-8100bcore_i5-9600tcore_i3-7101e_firmwarecore_i3-7020u_firmwarecore_i3-9320core_i5-11400xeon_d-2775tecore_i7-1068g7_firmwarecore_i7-1065g7core_i9-10980hk_firmwarecore_i3-8130uxeon_platinum_8276l_firmwarexeon_w-10885m_firmwarecore_i3-9100_firmwarexeon_w-3245mcore_i7-11370h_firmwarexeon_e-2378gcore_i7-1160g7core_i3-10105f_firmwarexeon_e3-1501l_v6_firmwarexeon_e-2124g_firmwarecore_i7-9700kfcore_i5-8305g_firmwarecore_i5-7500_firmwarecore_i7-10870h_firmwarecore_i5-8400hcore_i3-1110g4_firmwarexeon_platinum_8360hl_firmwarecore_i3-1110g4xeon_gold_6326xeon_gold_5317_firmwarecore_i5-10200hxeon_e-2226gxeon_d-2775te_firmwarecore_i3-10100f_firmwarecore_i3-8145ucore_i7-11700xeon_gold_5318y_firmwarecore_i5-9600_firmwarecore_i3-7020uxeon_platinum_8268_firmwarexeon_e3-1501l_v6xeon_gold_6262vcore_i3-8109ucore_i9-11900tcore_i7-9700f_firmwarecore_i7-1195g7_firmwarecore_i3-7100e_firmwarecore_i3-7300xeon_e-2378core_i7-11850hcore_i9-11900xeon_e-2134_firmwarecore_i5-10600_firmwarexeon_platinum_8376hxeon_silver_4210_firmwarecore_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i7-10610u_firmwarexeon_gold_6248rcore_i5-9500_firmwarexeon_silver_4214r_firmwarexeon_platinum_8276_firmwarecore_i7-11850hexeon_w-1290tcore_i5-8400h_firmwarexeon_w-11155mre_firmwarepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i9-9820x_firmwarexeon_e-2136pentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kcore_i5-10400t_firmwarecore_i3-8100xeon_w-2265xeon_gold_5215_firmwarecore_i9-11900hxeon_w-10855mxeon_w-2245_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarecore_i3-11100hexeon_d-1712trcore_i3-7300_firmwarexeon_w-11555mrecore_i7-11700k_firmwarecore_i5-7287u_firmwarecore_i7-7700xeon_d-2752ter_firmwarepentium_gold_g6505t_firmwarecore_i3-7102exeon_platinum_8280l_firmwareceleron_5205u_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1240_v6_firmwarecore_i7-1160g7_firmwarexeon_e3-1501m_v6xeon_gold_6250lcore_i5-8365uxeon_gold_6210uxeon_d-2187ntcore_i5-9600kfxeon_d-1732tecore_i5-8500b_firmwareall_flash_fabric-attached_storage_a250core_i5-7600core_i9-7940xxeon_platinum_8380hlxeon_w-3265_firmwarecore_i9-9960xcore_i7-10700fcore_i5-1030g4_firmwarecore_i7-8557u_firmwarecore_i5-1145g7core_i7-10750hcore_i3-7120_firmwarexeon_platinum_8253xeon_w-3235_firmwarecore_i3-8300xeon_w-1390xeon_gold_6242r_firmwarexeon_e-2186gcore_i5-7400txeon_e-2174gcore_i5-7260ucore_i7-8700bxeon_w-2145_firmwarexeon_d-2145ntxeon_gold_6238xeon_w-1250pcore_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-7800xxeon_e3-1275_v6_firmwarexeon_e-2334_firmwarecore_i5-10210yxeon_e3-1225_v6_firmwarecore_i5-1140g7core_i3-8100f_firmwarecore_i9-9900kf_firmwarexeon_w-3275mcore_i5-9500fcore_i5-10210u_firmwarecore_i5-10600txeon_e-2356gcore_i3-7300t_firmwareall_flash_fabric-attached_storage_c800core_i9-9900kscore_i5-10500h_firmwarecore_i5-9600xeon_gold_5315ypentium_gold_g6500t_firmwarecore_i5-7300u_firmwarecore_i3-9100fxeon_platinum_8354hcore_i9-11900_firmwarexeon_e-2224_firmwarexeon_gold_6256_firmwarepentium_gold_6405ucore_i7-10700kceleron_g5925_firmwarecore_i3-9320_firmwarecore_i5-8400b_firmwarexeon_e3-1280_v6core_i7-9800x_firmwarecore_i3-8100_firmwarecore_i7-11700kxeon_silver_4214rxeon_d-1715ter_firmwarexeon_e-2124core_i5-7287ucore_i7-10710ucore_i7-10700kfxeon_d-2141ixeon_w-1350p_firmwarecore_i5-8500t_firmwarecore_i3-11100he_firmwarexeon_e-2276g_firmwarexeon_gold_6230n_firmwarexeon_gold_5222core_i7-8706g_firmwareall_flash_fabric-attached_storage_a800xeon_w-2133_firmwarecore_i9-11900t_firmwarexeon_platinum_8360hlxeon_e3-1535m_v6core_i5-7400t_firmwarexeon_platinum_9221core_i9-9900core_i7-10510y_firmwarecore_i7-11390h_firmwarexeon_w-11865mle_firmwarexeon_e-2146g_firmwareceleron_g5905txeon_e-2388gcore_i7-7800x_firmwarexeon_w-2225_firmwarexeon_platinum_8360h_firmwarexeon_d-2752terxeon_gold_6238t_firmwarecore_i3-7100_firmwarecore_i9-9820xcore_i3-1120g4_firmwarexeon_w-2155xeon_e-2278g_firmwarecore_i7-8550ucore_i3-9100txeon_w-2145core_i5-8310y_firmwarecore_i9-9900x_firmwarecore_i7-11375h_firmwarecore_i9-10900_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarecore_i5-10505_firmwarecore_i3-7167uxeon_e-2176g_firmwarecore_i7-7567uxeon_w-2295_firmwarecore_i3-8145u_firmwareenterprise_linuxxeon_silver_4214xeon_gold_5315y_firmwarecore_i5-11260hcore_i3-7340_firmwarexeon_d-2161ixeon_silver_4210rcore_i5-10300h_firmwarexeon_d-2141i_firmwarecore_i7-7660u_firmwarecore_i7-11850h_firmwarecore_i5-8210yxeon_gold_5218bcore_i7-8750h_firmwarecore_i9-11900f_firmwarecore_i5-10200h_firmwarecore_i3-7300txeon_silver_4216_firmwarecore_i7-11700t_firmwarecore_i3-9100f_firmwarexeon_e-2246g_firmwarecore_i7-1185gre_firmwarepentium_gold_g6400_firmwarexeon_e-2174g_firmwarexeon_d-2187nt_firmwarecore_i5-11500core_i5-1135g7core_i5-8500core_i5-7600_firmwarexeon_w-3275m_firmwarecore_i7-10700kf_firmwarexeon_w-3235xeon_gold_6222v_firmwarexeon_e-2336_firmwarexeon_platinum_8260_firmwarexeon_gold_6226r_firmwarexeon_w-2225pentium_gold_g6405core_i7-7560u_firmwarexeon_w-2133core_i3-10305txeon_gold_6328hlcore_i9-9900t_firmwarepentium_gold_g5500_firmwarexeon_w-2223xeon_silver_4210r_firmwarecore_i9-7920x_firmwarecore_i7-8665ucore_i3-8300tall_flash_fabric-attached_storage_a900all_flash_fabric-attached_storage_a400core_i7-11700fxeon_e-2236core_i7-10850hxeon_e-2236_firmwarexeon_gold_6338t_firmwarecore_i3-1125g4_firmwarexeon_e-2126g_firmwarexeon_gold_6238_firmwarecore_i7-11800h_firmwareceleron_g5905core_i9-7960x_firmwarecore_i5-8400core_i3-10300xeon_gold_6246core_i5-1140g7_firmwarecore_i7-8086kpentium_gold_g5500t_firmwarexeon_w-3245m_firmwarecore_i9-11900kf_firmwarecore_i5-8600k_firmwarexeon_e3-1285_v6_firmwarexeon_e-2134xeon_d-2163itxeon_w-1390txeon_w-1270core_i5-10310y_firmwarecore_i3-1000g1core_i7-10510yxeon_gold_5215lxeon_silver_4215_firmwarecore_i5-7360u_firmwarexeon_w-2275_firmwarecore_i5-8210y_firmwarecore_i9-7960xcore_i5-9600kcore_i7-7820xceleron_g5905t_firmwarecore_i3-10305t_firmwarecore_i9-10900f_firmwarecore_i5-1155g7core_i3-9100t_firmwarecore_i5-11320h_firmwarexeon_gold_6250l_firmwarexeon_d-1715terxeon_gold_6258rceleron_g5900xeon_gold_6240lxeon_gold_6250core_i5-8350uxeon_gold_6348hxeon_w-3223_firmwarexeon_d-2173itcore_i7-11700txeon_d-2123itxeon_e-2246gcore_i3-10100y_firmwarecore_i5-11400h_firmwarexeon_gold_5218n_firmwarexeon_w-2255_firmwarexeon_gold_6330h_firmwarecore_i7-8700b_firmwarexeon_gold_5218tcore_i9-8950hkxeon_gold_6242_firmwarexeon_e-2104g_firmwarexeon_w-2123_firmwarexeon_platinum_8356h_firmwarexeon_e3-1501m_v6_firmwarexeon_e-2334core_i3-7350k_firmwarexeon_d-2166nt_firmwarecore_i9-10885hxeon_d-2712t_firmwarexeon_gold_6328hl_firmwarecore_i3-9300xeon_gold_5218r_firmwarexeon_e-2244gcore_i9-9900kcore_i3-9350kf_firmwarexeon_e-2176gxeon_e-2324gcore_i7-8709gcore_i3-7120core_i9-9920xcore_m3-8100y_firmwarexeon_e-2104gcore_i7-8557uxeon_silver_4214_firmwarexeon_e-2278ge_firmwarecore_i5-9500tcore_i5-8260u_firmwarecore_i7-8700tcore_i3-10305_firmwarexeon_platinum_9242xeon_d-2143it_firmwarexeon_d-1735trcore_i5-7400xeon_platinum_8280lcore_i5-11400fcore_i5-11500_firmwarecore_i3-7102e_firmwarexeon_platinum_8280_firmwarecore_i3-7320core_i7-1180g7xeon_e-2378g_firmwarexeon_w-1390_firmwarexeon_e3-1230_v6core_i9-11950h_firmwarecore_i5-1035g1xeon_gold_6230nxeon_w-3265xeon_gold_5218ncore_i7-8565u_firmwarexeon_gold_6246_firmwarecore_i5-11400f_firmwarexeon_platinum_9221_firmwarexeon_e-2186g_firmwarexeon_gold_6248r_firmwarexeon_e-2124gcore_i5-7600t_firmwarexeon_gold_6326_firmwarecore_i7-1165g7core_i5-11600kcore_i9-7980xe_firmwarecore_i7-11390hcore_i9-11900h_firmwarecore_i5-1030g4xeon_gold_5220xeon_e-2234core_i5-10500xeon_gold_6254xeon_silver_4209t_firmwarexeon_e-2356g_firmwarecore_i5-9400fcore_i7-9700t_firmwarecore_i3-7320tcore_i5-7440eqxeon_gold_5215l_firmwarexeon_w-1250xeon_platinum_8376hl_firmwarecore_i7-7820x_firmwarecore_i5-8279ucore_i3-8130u_firmwarexeon_gold_6336ycore_i3-7100upentium_gold_g6505_firmwarecore_i3-7101tecore_i5-11400hxeon_w-3275xeon_d-1735tr_firmwarecore_i5-7600kxeon_platinum_8270_firmwarecore_i3-1000g4_firmwarexeon_e-2126gxeon_silver_4209txeon_gold_6234_firmwarexeon_gold_6210u_firmwarecore_i3-7100t_firmwarecore_i5-11400_firmwarecore_i5-7360ucore_i3-8100fcore_i3-7340xeon_gold_5218t_firmwarexeon_gold_6248core_i9-11980hkcore_i5-10600kxeon_platinum_8260l_firmwarexeon_e3-1220_v6xeon_e-2388g_firmwarexeon_platinum_8280core_m3-8100ycore_i7-1165g7_firmwarexeon_platinum_8380hl_firmwarecore_i9-10900kfxeon_w-11155mrecore_i5-8250u_firmwarecore_i7-7567u_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarexeon_gold_6336y_firmwarecore_i3-1120g4xeon_d-2146nt_firmwarecore_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i5-10310yxeon_gold_6330hxeon_w-1290pcore_i5-8400t_firmwarexeon_gold_5218b_firmwarexeon_e-2286gxeon_gold_6222vxeon_w-11155mlexeon_platinum_8376hlxeon_gold_6242core_i5-8260ucore_i3-10100t_firmwarecore_i9-10900t_firmwarecore_i7-10810u_firmwarecore_i5-11600kf_firmwarexeon_e-2244g_firmwarecore_i7-10810ucore_i7-11700kf_firmwarecore_i5-10400f_firmwarexeon_platinum_8270core_i3-10105_firmwarexeon_gold_6242rxeon_e3-1245_v6xeon_silver_4215core_i3-1115grexeon_w-2235xeon_e-2378_firmwarecore_i7-8850hcore_i5-11500hcore_i3-10100fcore_i3-8300_firmwarecore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i5-1135g7_firmwarecore_i9-10900xxeon_gold_6238txeon_silver_4214ycore_i5-8257u_firmwarecore_i9-10980xecore_i9-10900kf_firmwarecore_i5-11600t_firmwarecore_i9-10850k_firmwarexeon_w-1290all_flash_fabric-attached_storage_2820core_i7-8809g_firmwarecore_i9-10885h_firmwarexeon_gold_6240rxeon_w-10885mceleron_g4900core_i5-1030g7_firmwarecore_i9-10900tpentium_gold_g5400core_i5-8310ycore_i5-7640xcore_i3-10110u_firmwarexeon_e-2324g_firmwarexeon_e-2278gel_firmwarexeon_gold_6226xeon_gold_6256xeon_gold_6238r_firmwarecore_i5-9500t_firmwarexeon_gold_6252core_i3-10320_firmwarecore_i3-1005g1xeon_w-11865mre_firmwarexeon_gold_6328hxeon_gold_6252_firmwarexeon_gold_6209u_firmwarecore_i9-9920x_firmwarecore_i5-8600tcore_i5-8305gxeon_platinum_8260lcore_i7-10850h_firmwarecore_i5-9400t_firmwarecore_i7-8559uxeon_e-2146gcore_i7-9700_firmwarexeon_d-2177ntpentium_gold_g6400xeon_w-2175Intel(R) Processors
CWE ID-CWE-1342
Information Exposure through Microarchitectural State after Transient Execution
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-9495
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-3.7||LOW
EPSS-2.48% / 84.69%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 13:31
Updated-04 Aug, 2024 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

Action-Not Available
Vendor-w1.fiWi-Fi AllianceDebian GNU/LinuxopenSUSEFreeBSD FoundationFedora ProjectSynology, Inc.
Product-freebsddebian_linuxradius_serverfedorahostapdbackports_slewpa_supplicantrouter_managerleaphostapd with EAP-pwd supportwpa_supplicant with EAP-pwd support
CWE ID-CWE-524
Use of Cache Containing Sensitive Information
CWE ID-CWE-203
Observable Discrepancy
CVE-2004-0778
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.74% / 88.99%
||
7 Day CHG~0.00%
Published-18 Aug, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CVS 1.11.x before 1.11.17, and 1.12.x before 1.12.9, allows remote attackers to determine the existence of arbitrary files and directories via the -X command for an alternate history file, which causes different error messages to be returned.

Action-Not Available
Vendor-n/aGNU
Product-cvsn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-2612
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 31.69%
||
7 Day CHG~0.00%
Published-12 Aug, 2022 | 19:36
Updated-03 Aug, 2024 | 00:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Side-channel information leakage in Keyboard input in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.

Action-Not Available
Vendor-Fedora ProjectGoogle LLC
Product-chromefedoraChrome
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-18887
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.81% / 73.30%
||
7 Day CHG~0.00%
Published-21 Nov, 2019 | 22:18
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.

Action-Not Available
Vendor-sensiolabsn/aFedora Project
Product-fedorasymfonyn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-19338
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 11.37%
||
7 Day CHG~0.00%
Published-13 Jul, 2020 | 16:04
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

Action-Not Available
Vendor-[UNKNOWN]Linux Kernel Organization, IncRed Hat, Inc.
Product-enterprise_linuxlinux_kernelLinux Kernel
CWE ID-CWE-385
Covert Timing Channel
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-13456
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 42.78%
||
7 Day CHG~0.00%
Published-03 Dec, 2019 | 19:53
Updated-04 Aug, 2024 | 23:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

Action-Not Available
Vendor-n/aFreeRADIUSopenSUSERed Hat, Inc.Linux Kernel Organization, Inc
Product-freeradiusenterprise_linuxlinux_kernelleapn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-23303
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 54.94%
||
7 Day CHG~0.00%
Published-17 Jan, 2022 | 00:00
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

Action-Not Available
Vendor-w1.fin/aFedora Project
Product-wpa_supplicanthostapdfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-23304
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 19.15%
||
7 Day CHG~0.00%
Published-17 Jan, 2022 | 00:00
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

Action-Not Available
Vendor-w1.fin/aFedora Project
Product-wpa_supplicanthostapdfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-46392
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.40%
||
7 Day CHG-0.03%
Published-15 Dec, 2022 | 00:00
Updated-21 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.

Action-Not Available
Vendor-n/aArm LimitedFedora Project
Product-fedorambed_tlsn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-6240
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.32%
||
7 Day CHG~0.00%
Published-04 Feb, 2024 | 14:11
Updated-31 Jul, 2025 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: marvin vulnerability side-channel leakage in the rsa decryption operation

A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-enterprise_linuxlinux_kernelRed Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9.0 Extended Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 9
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-38009
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-1.14% / 77.53%
||
7 Day CHG~0.00%
Published-23 Dec, 2021 | 00:05
Updated-04 Aug, 2024 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Action-Not Available
Vendor-Fedora ProjectGoogle LLCDebian GNU/Linux
Product-chromedebian_linuxfedoraChrome
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-37968
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-4.3||MEDIUM
EPSS-0.52% / 65.78%
||
7 Day CHG~0.00%
Published-08 Oct, 2021 | 21:30
Updated-04 Aug, 2024 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Action-Not Available
Vendor-Fedora ProjectGoogle LLCDebian GNU/Linux
Product-chromedebian_linuxfedoraChrome
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-3642
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.27% / 49.88%
||
7 Day CHG~0.00%
Published-05 Aug, 2021 | 20:48
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Wildfly Elytron in versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.

Action-Not Available
Vendor-quarkusn/aRed Hat, Inc.
Product-integration_camel_kopenshift_application_runtimesquarkusjboss_fuseprocess_automationjboss_enterprise_application_platform_expansion_packwildfly_elytrondescision_managerdata_gridjboss_enterprise_application_platformcodeready_studiobuild_of_quarkusintegration_camel_quarkuswildfly-elytron
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-18222
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.06% / 19.46%
||
7 Day CHG~0.00%
Published-23 Jan, 2020 | 00:00
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedorambed_crypton/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-34556
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 04:02
Updated-04 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-33560
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.27%
||
7 Day CHG~0.00%
Published-08 Jun, 2021 | 00:00
Updated-03 Aug, 2024 | 23:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.

Action-Not Available
Vendor-gnupgn/aOracle CorporationFedora ProjectDebian GNU/Linux
Product-communications_cloud_native_core_service_communication_proxydebian_linuxlibgcryptcommunications_cloud_native_core_network_slice_selection_functioncommunications_cloud_native_core_network_function_cloud_native_environmentfedoracommunications_cloud_native_core_network_repository_functioncommunications_cloud_native_core_binding_support_functionn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-16868
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.06% / 17.33%
||
7 Day CHG~0.00%
Published-03 Dec, 2018 | 14:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

Action-Not Available
Vendor-[UNKNOWN]GNU
Product-gnutlsgnutls
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-3143
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.23% / 45.56%
||
7 Day CHG~0.00%
Published-11 Jan, 2023 | 20:57
Updated-09 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses java.util.Arrays.equals in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use java.security.MessageDigest.isEqual instead. This flaw allows an attacker to access secure information or impersonate an authed user.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_enterprise_application_platformwildfly_elytronWildfly-elytron
CWE ID-CWE-203
Observable Discrepancy
CVE-2016-6489
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-2.10% / 83.36%
||
7 Day CHG~0.00%
Published-14 Apr, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.

Action-Not Available
Vendor-nettle_projectn/aRed Hat, Inc.Canonical Ltd.
Product-enterprise_linux_desktopnettleenterprise_linux_workstationenterprise_linux_serverenterprise_linux_hpc_nodeubuntu_linuxn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-5407
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-4.7||MEDIUM
EPSS-0.60% / 68.49%
||
7 Day CHG~0.00%
Published-15 Nov, 2018 | 21:00
Updated-05 Aug, 2024 | 05:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

Action-Not Available
Vendor-N/ACanonical Ltd.Debian GNU/LinuxNode.js (OpenJS Foundation)OpenSSLTenable, Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxpeoplesoft_enterprise_peopletoolstuxedoenterprise_linux_server_eusopensslenterprise_linux_server_ausenterprise_manager_base_platformmysql_enterprise_backupnode.jsprimavera_p6_enterprise_project_portfolio_managementvm_virtualboxdebian_linuxenterprise_linux_workstationapplication_serverenterprise_linux_server_tusenterprise_manager_ops_centerenterprise_linux_desktopnessusapi_gatewayProcessors supporting Simultaneous Multi-Threading
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-3639
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-46.74% / 97.59%
||
7 Day CHG~0.00%
Published-22 May, 2018 | 12:00
Updated-16 Sep, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Action-Not Available
Vendor-Debian GNU/LinuxMitel Networks Corp.Siemens AGIntel CorporationSonicWall Inc.Microsoft CorporationRed Hat, Inc.NVIDIA CorporationOracle CorporationCanonical Ltd.Arm Limited
Product-surface_proenterprise_linux_server_ausopenstackxeon_e3_1225_v3xeon_e5_2450lxeon_e5_1620_v3xeon_e5_1428lxeon_e5_1620_v4xeon_e3_1240l_v5windows_10xeon_e3_1270xeon_e3_1230l_v3xeon_e3_1225_v5xeon_e5_2643_v2simatic_ipc677c_firmwaresinumerik_tcu_30.3xeon_e3_1220l_v3itc1900_pro_firmwarexeon_e5_2450_v2simatic_ipc647cweb_application_firewallxeon_e5_2408l_v3xeon_e3_1240_v2xeon_e5_2609_v4simatic_ipc627catom_zxeon_e3_1265l_v2xeon_e3_1278l_v4xeon_e3_1240simatic_ipc547g_firmwarexeon_e3_1246_v3xeon_e5_2637itc1900_proxeon_e5_2448litc1500_pro_firmwaresimatic_ipc347esinema_remote_connect_firmwareitc1900jetson_tx1xeon_e3enterprise_linux_serverxeon_e5_2608l_v3xeon_e3_1501l_v6solarisxeon_e5_1650_v3xeon_e5_2430lsimatic_ipc677cxeon_e7xeon_e3_1240_v5xeon_e5_2428l_v3xeon_e5_2430l_v2xeon_e3_1280_v5simatic_ipc847dxeon_e5_2648l_v3simatic_ipc827cceleron_nxeon_e5_2428lxeon_e5_1660_v4itc1900_firmwarexeon_e5_2428l_v2simatic_ipc477exeon_e5_2407_v2simatic_field_pg_m4_firmwaresimatic_ipc427d_firmwarexeon_e5_2650_v2xeon_e3_1245_v3xeon_e3_1245xeon_e3_1225xeon_e5_2630l_v3xeon_e3_1275_v2xeon_e5_2620_v3cortex-axeon_e3_1241_v3simatic_ipc427e_firmwareitc2200_pro_firmwaresimatic_ipc647d_firmwarexeon_platinummivoice_connectxeon_e5_1680_v4xeon_e5_2628l_v3xeon_e5_2430xeon_e5_2643_v3xeon_e5_1428l_v2xeon_e3_1240l_v3sinumerik_tcu_30.3_firmwarexeon_e3_1285l_v4secure_mobile_accessitc2200xeon_e3_1230_v6local_service_management_systemxeon_e5_2643_v4xeon_e5_2620xeon_e3_1285_v6xeon_e5_2418lxeon_e3_1275_v5xeon_e3_1286_v3xeon_e3_1268l_v5xeon_e3_1290xeon_e5_2448l_v2xeon_e5_1650_v4xeon_e5_2630l_v4simatic_ipc677dsinumerik_840_d_sl_firmwarexeon_e5_2403_v2virtualization_managerxeon_e3_1268l_v3simatic_ipc477d_firmwarexeon_e3_1285_v3xeon_e5_2450xeon_e5_2623_v3xeon_e5_2650l_v3simatic_field_pg_m5xeon_e3_1501m_v6mivoice_businessxeon_e3_1265l_v4simatic_ipc477e_firmwaresimatic_ipc847c_firmwaresimatic_et_200_sp_firmwaresimatic_ipc477e_proatom_csimatic_ipc827datom_esimatic_et_200_spxeon_e5_1660xeon_e5_2618l_v3surface_pro_with_lte_advancedxeon_e5_2618l_v2xeon_e3_1280_v3simatic_ipc627dxeon_e3_12201_v2xeon_e3_1270_v2xeon_e5xeon_e3_1280simatic_s7-1500xeon_e5_2628l_v4xeon_e5_2640_v3xeon_e3_1270_v3simatic_ipc3000_smart_firmwarexeon_e5_2608l_v4xeon_e5_2650enterprise_linux_eusxeon_e3_1265l_v3xeon_e5_1650_v2cloud_global_management_systemxeon_e5_2609xeon_e3_1260l_v5xeon_e5_2650lvirtualizationxeon_e5_2418l_v2xeon_e3_1225_v6xeon_e5_2640sinumerik_840_d_slruggedcom_ape_firmwareatom_x5-e3930simatic_ipc547gsimatic_ipc847cxeon_e3_1285_v4atom_x7-e3950xeon_e5_2630l_v2simatic_ipc477e_pro_firmwaremicollabxeon_e5_2403xeon_e3_1260lxeon_e5_2438l_v3xeon_e3_12201pentiumsimatic_s7-1500_firmwarexeon_e3_1220_v6xeon_e3_1230_v2xeon_e5_1680_v3xeon_e5_1630_v3simatic_ipc647c_firmwareenterprise_linux_workstationxeon_e3_1235xeon_e3_1281_v3xeon_e5_1428l_v3simatic_ipc477c_firmwaresimotion_p320-4e_firmwarexeon_e5_2648lsimatic_ipc347e_firmwarexeon_e3_1276_v3xeon_silverxeon_e5_1620_v2xeon_e5_2630_v2itc2200_firmwaremivoic_mx-onecore_i7xeon_e-1105cxeon_e5_2630lxeon_e5_2643simatic_ipc827c_firmwaresimotion_p320-4exeon_e3_1275l_v3debian_linuxitc1500xeon_e3_1105c_v2xeon_e5_2637_v2itc1500_proxeon_e3_1245_v5xeon_e5_2430_v2xeon_e5_2640_v4xeon_e5_2648l_v2windows_server_2008itc2200_prosimatic_ipc677d_firmwarexeon_e3_1230_v3xeon_e3_1226_v3xeon_e5_2637_v3ruggedcom_apesimatic_ipc547e_firmwarexeon_e3_1245_v6xeon_e5_2420_v2core_i3xeon_e3_1505m_v5mivoice_border_gatewayxeon_e5_2620_v4simatic_ipc827d_firmwarecore_i5xeon_e3_1235l_v5surface_studioxeon_e5_1660_v3celeron_jxeon_e3_1505l_v5xeon_e3_1230simatic_ipc427c_firmwarexeon_e5_2630_v4pentium_jxeon_e3_1275_v6xeon_e3_1285l_v3xeon_e5_1620atom_x5-e3940simatic_ipc427exeon_e5_2640_v2simatic_ipc477dsimatic_ipc427dxeon_e5_2609_v2simatic_itp1000_firmwarexeon_e5_1630_v4xeon_e5_2407xeon_e3_1220_v3windows_7xeon_e3_1280_v6pentium_silversimatic_ipc3000_smartenterprise_linux_server_tussimatic_ipc547exeon_e5_2618l_v4xeon_e3_1275_v3xeon_e3_1505l_v6ubuntu_linuxwindows_8.1xeon_e3_1240_v6global_management_systemxeon_e5_2620_v2xeon_e3_1270_v5itc1500_firmwaresinema_remote_connectsurfacexeon_e5_2450l_v2simatic_ipc627c_firmwaremivoice_5000xeon_e5_2609_v3xeon_e3_1220_v5xeon_e5_2603xeon_e5_2630_v3simatic_itp1000core_mxeon_e5_2650l_v2enterprise_linux_desktopxeon_e3_1231_v3simatic_ipc427cxeon_e3_1280_v2xeon_e5_1650xeon_e5_2470enterprise_linuxxeon_goldsimatic_ipc647dxeon_e5_2603_v3xeon_e3_1286l_v3simatic_field_pg_m5_firmwaresimatic_ipc847d_firmwarexeon_e5_2603_v2open_integration_gatewayxeon_e3_1290_v2xeon_e5_2603_v4xeon_e3_1220_v2xeon_e3_1270_v6simatic_ipc477cwindows_server_2012sinumerik_pcu_50.5windows_server_2016xeon_e3_1225_v2jetson_tx2xeon_e3_1271_v3surface_bookxeon_e5_2623_v4xeon_e3_1230_v5xeon_e5_2440simatic_ipc627d_firmwarexeon_e5_2440_v2mrg_realtimexeon_e3_1258l_v4xeon_e5_2650_v4sonicosvxeon_e5_2418l_v3sinumerik_pcu_50.5_firmwarexeon_e5_2628l_v2micloud_management_portalxeon_e5_2470_v2simatic_field_pg_m4xeon_e3_1245_v2xeon_e5_2637_v4struxureware_data_center_expertxeon_e5_2650_v3xeon_e3_1240_v3xeon_e5_2648l_v4xeon_e5_1660_v2email_securityxeon_e5_2630xeon_e5_2420xeon_e3_1125c_v2Multiple
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-0553
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.91% / 74.87%
||
7 Day CHG-0.15%
Published-16 Jan, 2024 | 11:40
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gnutls: incomplete fix for cve-2023-5981

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.

Action-Not Available
Vendor-Red Hat, Inc.Fedora ProjectGNU
Product-fedoragnutlsenterprise_linuxRHODF-4.15-RHEL-9Red Hat Enterprise Linux 8Red Hat Enterprise Linux 8.6 Extended Update SupportRed Hat Enterprise Linux 6Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 7Red Hat Enterprise Linux 9RHOL-5.8-RHEL-9
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-0564
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 4.07%
||
7 Day CHG~0.00%
Published-30 Jan, 2024 | 15:01
Updated-30 May, 2025 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication

A flaw was found in the Linux kernel's memory deduplication mechanism. The max page sharing of Kernel Samepage Merging (KSM), added in Linux kernel version 4.4.0-96.119, can create a side channel. When the attacker and the victim share the same host and the default setting of KSM is "max page sharing=256", it is possible for the attacker to time the unmap to merge with the victim's page. The unmapping time depends on whether it merges with the victim's page and additional physical pages are created beyond the KSM's "max page share". Through these operations, the attacker can leak the victim's page.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-enterprise_linuxlinux_kernelRed Hat Enterprise Linux 9Red Hat Enterprise Linux 7Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-24119
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.29% / 52.34%
||
7 Day CHG-0.06%
Published-14 Jul, 2021 | 00:00
Updated-03 Aug, 2024 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-0361
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-2.61% / 85.07%
||
7 Day CHG-0.41%
Published-15 Feb, 2023 | 00:00
Updated-19 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

Action-Not Available
Vendor-n/aFedora ProjectDebian GNU/LinuxGNURed Hat, Inc.NetApp, Inc.
Product-enterprise_linuxfedoragnutlsconverged_systems_advisor_agentactive_iq_unified_managerontap_select_deploy_administration_utilitydebian_linuxgnutls
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-50781
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.22%
||
7 Day CHG~0.00%
Published-05 Feb, 2024 | 20:45
Updated-07 Feb, 2025 | 02:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
M2crypto: bleichenbacher timing attacks in the rsa decryption api - incomplete fix for cve-2020-25657

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Action-Not Available
Vendor-m2crypto_projectRed Hat, Inc.
Product-m2cryptoupdate_infrastructureenterprise_linuxRed Hat Virtualization 4Red Hat Enterprise Linux 9Red Hat Enterprise Linux 6Red Hat Update Infrastructure 4 for Cloud ProvidersRed Hat Enterprise Linux 8Red Hat Enterprise Linux 7
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-50782
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.71% / 71.26%
||
7 Day CHG~0.00%
Published-05 Feb, 2024 | 20:45
Updated-03 Aug, 2025 | 10:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659

A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Action-Not Available
Vendor-cryptography.ioRed Hat, Inc.Couchbase, Inc.
Product-ansible_automation_platformcryptographyenterprise_linuxupdate_infrastructurecouchbase_serverRed Hat Enterprise Linux 7Red Hat Ansible Automation Platform 2Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8Red Hat Satellite 6Red Hat Update Infrastructure 4 for Cloud Providers
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-21181
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-1.36% / 79.36%
||
7 Day CHG~0.00%
Published-09 Mar, 2021 | 17:46
Updated-03 Aug, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Side-channel information leakage in autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.

Action-Not Available
Vendor-Fedora ProjectGoogle LLCDebian GNU/Linux
Product-chromedebian_linuxfedoraChrome
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-0495
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-4.7||MEDIUM
EPSS-0.31% / 53.85%
||
7 Day CHG~0.00%
Published-13 Jun, 2018 | 23:00
Updated-05 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Action-Not Available
Vendor-gnupgn/aOracle CorporationRed Hat, Inc.Canonical Ltd.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlibgcryptenterprise_linux_workstationtraffic_directorenterprise_linux_desktopansible_towerLibgcrypt before 1.7.10 and 1.8.x before 1.8.3
CWE ID-CWE-203
Observable Discrepancy
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found