Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2024-0914: opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Red Hat: CVE-2024-0914: opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:C/I:N/A:N)
Published
01/31/2024
Created
03/11/2024
Added
03/11/2024
Modified
04/29/2024

Description

A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.

Solution(s)

  • redhat-upgrade-opencryptoki
  • redhat-upgrade-opencryptoki-ccatok
  • redhat-upgrade-opencryptoki-ccatok-debuginfo
  • redhat-upgrade-opencryptoki-debuginfo
  • redhat-upgrade-opencryptoki-debugsource
  • redhat-upgrade-opencryptoki-devel
  • redhat-upgrade-opencryptoki-ep11tok
  • redhat-upgrade-opencryptoki-ep11tok-debuginfo
  • redhat-upgrade-opencryptoki-icatok
  • redhat-upgrade-opencryptoki-icatok-debuginfo
  • redhat-upgrade-opencryptoki-icsftok
  • redhat-upgrade-opencryptoki-icsftok-debuginfo
  • redhat-upgrade-opencryptoki-libs
  • redhat-upgrade-opencryptoki-libs-debuginfo
  • redhat-upgrade-opencryptoki-swtok
  • redhat-upgrade-opencryptoki-swtok-debuginfo
  • redhat-upgrade-opencryptoki-tpmtok
  • redhat-upgrade-opencryptoki-tpmtok-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;