First published: Fri Aug 21 2020(Updated: )
An issue was discovered in wolfSSL before 4.5.0, when single precision is not employed. Local attackers can conduct a cache-timing attack against public key operations. These attackers may already have obtained sensitive information if the affected system has been used for private key operations (e.g., signing with a private key).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WolfSSL wolfssl | <4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15309 is a vulnerability in wolfSSL before version 4.5.0 that allows local attackers to conduct a cache-timing attack against public key operations.
CVE-2020-15309 affects wolfSSL before version 4.5.0 and can be exploited by local attackers to conduct a cache-timing attack.
CVE-2020-15309 has a severity level of high.
To fix CVE-2020-15309, you should update wolfSSL to version 4.5.0 or later.
A cache-timing attack is a method where an attacker tracks the time it takes to access certain cache locations, allowing them to infer sensitive information.