An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.
References
Link | Resource |
---|---|
https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2 | Release Notes Third Party Advisory |
https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0 | Release Notes Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/ | Mailing List Third Party Advisory |
Information
Published : 2022-12-15 15:15
Updated : 2023-03-01 07:11
NVD link : CVE-2022-46392
Mitre link : CVE-2022-46392
JSON object : View
CWE
CWE-203
Observable Discrepancy
Products Affected
arm
- mbed_tls
fedoraproject
- fedora