First published: Thu Feb 23 2017(Updated: )
In versions of wolfSSL before 3.10.2 the function fp_mul_comba makes it easier to extract RSA key information for a malicious user who has access to view cache on a machine.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wolfSSL | <3.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6076 has been classified as a medium severity vulnerability due to the potential for RSA key extraction.
To mitigate CVE-2017-6076, upgrade to wolfSSL version 3.10.2 or later.
CVE-2017-6076 allows malicious users with access to the machine's cache to extract RSA key information.
CVE-2017-6076 affects all wolfSSL versions prior to 3.10.2.
There is no known workaround for CVE-2017-6076; the recommended action is to upgrade the library.