First published: Wed Jan 25 2023(Updated: )
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2164487 is critical due to the potential for a Bleichenbacher style attack that can recover ciphertext over a network.
To fix REDHAT-BUG-2164487, users should update to the latest patched version of OpenSSL provided by their vendor.
REDHAT-BUG-2164487 affects systems utilizing vulnerable versions of OpenSSL that implement RSA decryption.
REDHAT-BUG-2164487 is associated with a timing-based side channel attack known as a Bleichenbacher attack.
Yes, REDHAT-BUG-2164487 can potentially be exploited remotely if the attacker can send numerous trial messages to the vulnerable server.