cve-2015-5738
Vulnerability from cvelistv5
Published
2016-07-26 17:00
Modified
2024-08-06 06:59
Severity ?
EPSS score ?
Summary
The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://fortiguard.com/advisory/rsa-crt-key-leak-under-certain-conditions | Broken Link | |
cve@mitre.org | https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf | Technical Description, Third Party Advisory | |
cve@mitre.org | https://support.f5.com/kb/en-us/solutions/public/k/91/sol91245485.html | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:04.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/kb/en-us/solutions/public/k/91/sol91245485.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fortiguard.com/advisory/rsa-crt-key-leak-under-certain-conditions" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-07-26T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/kb/en-us/solutions/public/k/91/sol91245485.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fortiguard.com/advisory/rsa-crt-key-leak-under-certain-conditions" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf", "refsource": "MISC", "url": "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/k/91/sol91245485.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/k/91/sol91245485.html" }, { "name": "http://fortiguard.com/advisory/rsa-crt-key-leak-under-certain-conditions", "refsource": "CONFIRM", "url": "http://fortiguard.com/advisory/rsa-crt-key-leak-under-certain-conditions" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5738", "datePublished": "2016-07-26T17:00:00", "dateReserved": "2015-08-05T00:00:00", "dateUpdated": "2024-08-06T06:59:04.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-5738\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-07-26T17:59:00.137\",\"lastModified\":\"2023-08-16T14:17:11.363\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n de RSA-CRT en Cavium Software Development Kit (SDK) 2.x cuando es utilizada en Hardware OCTEON II CN6xxx en Linux para soporte TLS con Perfect Forward Secrecy (PFS), facilita a atacantes remotos obtener claves RSA privadas llevando a cabo un ataque de canal lateral Lenstra.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marvell:software_development_kit:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E332EC67-B3F5-437D-BC1F-D563B89181B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:marvell:octeon_ii_cn6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E31C6DFB-101A-493A-8515-4DAAB9F3A821\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:marvell:octeon_ii_cn6010:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"521C4A1A-96A2-4888-A345-8A153B793178\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:marvell:octeon_ii_cn6020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94651B37-ABBE-4400-8880-033A4EDAB41F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3.2\",\"versionEndIncluding\":\"3.5.1\",\"matchCriteriaId\":\"90B753A2-3CC6-46A2-82C4-F2B7A029E18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndIncluding\":\"4.4.0\",\"matchCriteriaId\":\"E0AAD5D5-E970-4875-8FDF-E940D9F00636\"}]}]}],\"references\":[{\"url\":\"http://fortiguard.com/advisory/rsa-crt-key-leak-under-certain-conditions\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/k/91/sol91245485.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.