First published: Fri Mar 05 2010(Updated: )
OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.8i | |
Gaisler Leon3 SoC | ||
Xilinx Virtex-II Pro FPGA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0928 is considered a medium severity vulnerability due to the risk it poses from physically proximate attackers.
To mitigate CVE-2010-0928, upgrade OpenSSL to a version that resolves this vulnerability, starting with versions later than 0.9.8i.
CVE-2010-0928 affects OpenSSL 0.9.8i running on the Gaisler Research LEON3 SoC and Xilinx Virtex-II Pro FPGA.
CVE-2010-0928 enables attacks that could exploit improper signature verification, potentially leading to unauthorized access.
While CVE-2010-0928 is an older vulnerability, it remains a concern for legacy systems still using OpenSSL 0.9.8i.