First published: Mon Mar 10 2025(Updated: )
IBM CCA could allow an attacker to obtain sensitive information due to a timing attack during certain RSA operations.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Common Cryptographic Architecture (CCA) | >=7.0.0<=7.5.51 | |
IBM Common Cryptographic Architecture (CCA) 7.x | <=7.0.0 - 7.5.51 | |
IBM 4769 Developers Toolkit | <=7.0.0 - 7.5.51 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41760 is considered a high severity vulnerability due to the potential for sensitive information leakage through a timing attack.
To mitigate CVE-2024-41760, upgrade IBM Common Cryptographic Architecture to version 7.5.52 or later.
CVE-2024-41760 affects IBM Common Cryptographic Architecture versions 7.0.0 through 7.5.51, as well as related toolkit products.
CVE-2024-41760 allows attackers to exploit a timing attack to reveal sensitive information during RSA operations.
While upgrading is the recommended solution, specific mitigations for timing attacks may include changing how RSA operations are implemented.