First published: Wed Dec 13 2023(Updated: )
A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/m2crypto | <=0.40.1 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Update Infrastructure | =4 | |
M2Crypto |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50781 is classified as a critical vulnerability due to its potential to allow remote attackers to decrypt sensitive data.
To mitigate CVE-2023-50781, update m2crypto to a version higher than 0.40.1 immediately.
CVE-2023-50781 affects m2crypto versions up to and including 0.40.1 on Red Hat Enterprise Linux 8.0, 9.0, and Red Hat Update Infrastructure 4.
Yes, CVE-2023-50781 could potentially lead to data breaches by allowing attackers to decrypt messages in TLS servers using RSA key exchanges.
If unable to update due to compatibility issues, evaluate potential workarounds such as using alternative cryptographic libraries while seeking a permanent fix.