First published: Tue Jul 26 2016(Updated: )
The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Marvell Software Development Kit | =2.0 | |
Marvell OCTEON II CN6000 | ||
Marvell OCTEON II cn6010 | ||
Marvell OCTEON II CN6020 | ||
F5 Traffix Systems Signaling Delivery Controller | >=3.3.2<=3.5.1 | |
F5 Traffix Systems Signaling Delivery Controller | >=4.0.0<=4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5738 is considered critical due to the potential exposure of private RSA keys through a side-channel attack.
To mitigate CVE-2015-5738, upgrade to a version of the Cavium Software Development Kit that is not vulnerable to the issue.
CVE-2015-5738 affects the Cavium Software Development Kit 2.x running on OCTEON II CN6xxx hardware, specifically in TLS implementations.
CVE-2015-5738 is associated with a Lenstra side-channel attack that can compromise private RSA keys.
No, CVE-2015-5738 specifically affects the Marvell Software Development Kit version 2.0.