384
VMScore

CVE-2018-0497

Published: 28/07/2018 Updated: 10/02/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

ARM mbed TLS prior to 2.12.0, prior to 2.7.5, and prior to 2.1.14 allows remote malicious users to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

arm mbed tls

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #904821 mbedtls: CVE-2018-0497, CVE-2018-0498: Remote plaintext recovery on use of CBC based ciphersuites through a timing side-channel Package: src:mbedtls; Maintainer for src:mbedtls is James Cowgill <jcowgill@debianorg>; Reported by: James Cowgill <jcowgill@debianorg> Date: Sat, 28 Jul 20 ...
Several security issues were fixed in mbedtls ...
Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks For the stable distribution (stretch), these problems have been fixed in version 242-1+deb9u3 We recommend that you upgrade your mbedtls packages For the detailed security status of mbedtls ...
A remote plaintext recovery security issue has been found in Mbed TLS before 2120, 275 or 2114, when using a CBC based ciphersuite To be able to mount an attack, the attacker has to be able to observe and manipulate network packets and, for TLS, to be able to generate multiple sessions where the same plaintext is sent For DTLS a single sess ...