First published: Thu Aug 29 2024(Updated: )
Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the ed25519_key structure.
Credit: facts@wolfssl.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
wolfSSL wolfMQTT | =5.6.6 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2881 has been designated a high severity due to its potential for privilege escalation and information disclosure.
To resolve CVE-2024-2881, upgrade WolfSSL to version 5.7.0 or later, as this version includes patches for the vulnerability.
CVE-2024-2881 affects users of WolfSSL version 5.6.6 operating on Linux or Windows systems.
CVE-2024-2881 can compromise systems where a remote attacker shares the same host as a vulnerable victim process.
CVE-2024-2881 is caused by a fault injection vulnerability in the wc_ed25519_sign_msg function in WolfSSL.