First published: Tue Dec 24 2019(Updated: )
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WolfSSL wolfssl | <4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-19963.
The severity of CVE-2019-19963 is medium.
The affected software is Wolfssl version up to but excluding 4.3.0.
The vulnerability in CVE-2019-19963 occurs when DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
To fix the vulnerability in CVE-2019-19963, you should update to version 4.3.0 or later of Wolfssl.