First published: Fri Jul 29 2022(Updated: )
When compressing or decompressing elliptic curve points using the Sweet B library, an incorrect choice of sign bit is used. An attacker with user level privileges and no other user's assistance can exploit this vulnerability with only knowledge of the public key and the library. The resulting output may cause an error when used in other operations; for instance, verification of a valid signature under a decompressed public key may fail. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.
Credit: psirt@wdc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Westerndigital Sweet B | =1 |
The vulnerability was addressed by correcting the choice of sign bit in the affected routines. To get the latest version of the Sweet B library, update your local repository from https://github.com/westerndigitalcorporation/sweet-b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23001 is a vulnerability that occurs when compressing or decompressing elliptic curve points using the Sweet B library, where an incorrect choice of sign bit is used.
The severity of CVE-2022-23001 is medium, with a severity value of 5.3.
An attacker with user level privileges and knowledge of the public key and the library can exploit CVE-2022-23001.
The Sweet B library version 1 by Western Digital is affected by CVE-2022-23001.
To fix CVE-2022-23001, it is recommended to update to a patched version of the Sweet B library provided by Western Digital.