vulnerability

FreeBSD: VID-4c69240f-f02c-11ea-838a-0011d823eebd (CVE-2020-16150): Mbed TLS -- Local side channel attack on classical CBC decryption in (D)TLS

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Sep 6, 2020
Added
Sep 7, 2020
Modified
Dec 10, 2025

Description

Manuel Pégourié-Gonnard reports: When decrypting/authenticating (D)TLS record in a connection using a CBC ciphersuite without the Encrypt-then-Mac extension RFC 7366, Mbed TLS used dummy rounds of the compression function associated with the hash used for HMAC in order to hide the length of the padding to remote attackers, as recommended in the original Lucky Thirteen paper. A local attacker who is able to observe the state of the cache could monitor the presence of mbedtls_md_process() in the cache in order to determine when the actual computation ends and when the dummy rounds start. This is a reliable target as it's always called at least once, in response to a previous attack. The attacker can then continue with one of many well-documented Lucky 13 variants.

Solution

freebsd-upgrade-package-mbedtls
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.