CWE
327 385
Advisory Published
CVE Published
Updated

CVE-2018-0735: Timing attack against ECDSA signature generation

First published: Thu Oct 25 2018(Updated: )

A flaw was found in OpenSSL versions from 1.1.0 through 1.1.0i inclusive and version 1.1.1. The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. References: <a href="https://www.openssl.org/news/secadv/20181029.txt">https://www.openssl.org/news/secadv/20181029.txt</a> Upstream Patch: <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1</a> <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4</a>

Credit: openssl-security@openssl.org

Affected SoftwareAffected VersionHow to fix
redhat/openssl<1:1.0.2k-16.el7_6.1
1:1.0.2k-16.el7_6.1
redhat/openssl<1:1.1.1c-2.el8
1:1.1.1c-2.el8
redhat/openssl<1.1.0
1.1.0
redhat/openssl<1.1.1
1.1.1
debian/openssl
1.1.1w-0+deb11u1
1.1.1n-0+deb11u5
3.0.14-1~deb12u1
3.0.14-1~deb12u2
3.3.2-1
OpenSSL>=1.1.0<=1.1.0i
OpenSSL=1.1.1
Ubuntu=14.04
Ubuntu=16.04
Ubuntu=18.04
Ubuntu=18.10
Debian=8.0
Debian=9.0
Node.js>=10.0.0<10.12.0
Node.js>=11.0.0<11.3.0
Node.js=10.13.0
All of
NetApp CN1610
NetApp CN1610 Firmware
NetApp Cloud Backup
NetApp Element OS
NetApp OnCommand Unified Manager for Windows
NetApp OnCommand Unified Manager for vSphere>=9.4
NetApp SANtricity SMI-S Provider Firmware
NetApp SMI-S Provider
NetApp SnapDrive for Unix
NetApp SnapDrive for Windows
NetApp SteelStore Cloud Integrated Storage
Oracle API Gateway=11.1.2.4.0
Oracle Java System Application Server=0.9.8
Oracle Java System Application Server=1.0.0
Oracle Java System Application Server=1.0.1
Oracle Enterprise Manager=12.1.0.5.0
Oracle Enterprise Manager=13.2.0.0.0
Oracle Enterprise Manager=13.3.0.0.0
Oracle Enterprise Manager Ops Center=12.3.3
Oracle MySQL<=5.6.42
Oracle MySQL>=5.7.0<=5.7.24
Oracle MySQL>=8.0.0<=8.0.13
Oracle Peoplesoft Enterprise Campus Software Campus Community=8.55
Oracle Peoplesoft Enterprise Campus Software Campus Community=8.56
Oracle Peoplesoft Enterprise Campus Software Campus Community=8.57
Oracle Primavera P6 Enterprise Project Portfolio Management>=17.7<=17.12
Oracle Primavera P6 Enterprise Project Portfolio Management=8.4
Oracle Primavera P6 Enterprise Project Portfolio Management=15.1
Oracle Primavera P6 Enterprise Project Portfolio Management=15.2
Oracle Primavera P6 Enterprise Project Portfolio Management=16.1
Oracle Primavera P6 Enterprise Project Portfolio Management=16.2
Oracle Primavera P6 Enterprise Project Portfolio Management=18.8
Tarantella Secure Global Desktop=5.4
Oracle Tuxedo=12.1.1.0.0
Oracle VirtualBox<6.0.0
Oracle VirtualBox>=5.0.0<5.2.24
NetApp CN1610
NetApp CN1610 Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2018-0735?

    CVE-2018-0735 has been classified with a high severity level due to its potential to allow attackers to recover private keys through a timing side channel attack.

  • How do I fix CVE-2018-0735?

    To remediate CVE-2018-0735, update OpenSSL to a version that is not vulnerable, such as 1:1.0.2k-16.el7_6.1 or 1.1.1c-2.el8.

  • Which versions of OpenSSL are affected by CVE-2018-0735?

    CVE-2018-0735 affects OpenSSL versions from 1.1.0 to 1.1.0i inclusive, and version 1.1.1.

  • Can CVE-2018-0735 be exploited remotely?

    Yes, CVE-2018-0735 can potentially be exploited remotely if an attacker can observe the timing of ECDSA signatures.

  • What types of systems are likely affected by CVE-2018-0735?

    Systems using OpenSSL versions 1.1.0 through 1.1.0i and 1.1.1, including many Linux distributions like Red Hat and Ubuntu, are likely affected by CVE-2018-0735.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203