First published: Thu Aug 29 2024(Updated: )
Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the RsaKey structure.
Credit: facts@wolfssl.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
wolfSSL wolfMQTT | =5.6.6 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1545 is considered a high severity vulnerability due to its potential to allow remote attackers to escalate privileges and disclose sensitive information.
To fix CVE-2024-1545, upgrade WolfSSL to version 5.7.0 or later.
CVE-2024-1545 affects systems running WolfSSL version 5.6.6 on both Linux and Windows operating systems.
CVE-2024-1545 can facilitate information disclosure and privilege escalation attacks by co-resident attackers on the same system.
CVE-2024-1545 was reported in 2024 as a vulnerability in the WolfSSL library.