First published: Fri Jul 29 2022(Updated: )
When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leveraged by an attacker to cause an error scenario, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.
Credit: psirt@wdc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Westerndigital Sweet B | =1 |
The vulnerability was addressed by improving the point-scalar multiplication algorithm to account for anomalous input and by ensuring that errors are returned from library routines before any output buffer is written. To get the latest version of the Sweet B library, update your local repository from https://github.com/westerndigitalcorporation/sweet-b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-23004.
The severity of CVE-2022-23004 is medium with a CVSS score of 5.3.
The affected software is Western Digital Sweet B version 1.
An attacker can exploit CVE-2022-23004 by leveraging the error scenario caused when computing a shared secret or point multiplication on the NIST P-256 curve with a public key X coordinate of zero.
Yes, Western Digital has provided a fix for CVE-2022-23004. Please refer to the reference link for more information.