vulnerability
FreeBSD: VID-1c948fd3-dac0-11e9-81b2-0011d823eebd: Mbed TLS -- Side channel attack on deterministic ECDSA
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:C/I:N/A:N) | Sep 19, 2019 | Sep 19, 2019 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:C/I:N/A:N)
Published
Sep 19, 2019
Added
Sep 19, 2019
Modified
Dec 10, 2025
Description
Janos Follath reports: Mbed TLS does not have a constant-time/constant-trace arithmetic library and uses blinding to protect against side channel attacks. In the ECDSA signature routine previous Mbed TLS versions used the same RNG object for generating the ephemeral key pair and for generating the blinding values. The deterministic ECDSA function reused this by passing the RNG object created from the private key and the message to be signed as prescribed by RFC 6979. This meant that the same RNG object was used whenever the same message was signed, rendering the blinding ineffective. If the victim can be tricked to sign the same message repeatedly, the private key may be recoverable through side channels.
Solution
freebsd-upgrade-package-mbedtls
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.