First published: Fri Feb 16 2024(Updated: )
A vulnerability in the privateDecrypt() API of the crypto library, allowed a covert timing side-channel during PKCS#1 v1.5 padding error handling. The vulnerability revealed significant timing differences in decryption for valid and invalid ciphertexts. This poses a serious threat as attackers could remotely exploit the vulnerability to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing Json Web Encryption messages. This vulnerability affects all users in all active release lines: 18.x, 20.x, and 21.x.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/node | <18.19.1 | 18.19.1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46809 is considered a serious vulnerability that can lead to timing side-channel attacks during PKCS#1 v1.5 padding error handling.
To fix CVE-2023-46809, update the affected software to the latest patched versions provided by the vendor.
CVE-2023-46809 affects Node.js and different versions of IBM Cognos Analytics.
CVE-2023-46809 allows attackers to exploit timing differences in decryption processes, potentially revealing sensitive data.
Yes, patches are available for the affected versions of both Node.js and IBM Cognos Analytics.