4.3
CVSSv2

CVE-2018-0737

Published: 16/04/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 17.10

Vendor Advisories

Debian Bug report logs - #895844 openssl: CVE-2018-0737: Cache timing vulnerability in RSA Key Generation Source Package: src:openssl; Maintainer for src:openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 16 Apr 2018 18:54:01 UTC ...
Synopsis Critical: Red Hat Ansible Tower 331-2 Release - Container Image Type/Severity Security Advisory: Critical Topic Security Advisory Description Red Hat Ansible Tower 331 is now available and contains the following bug fixes: Fixed event callback error when in-line vaulted variabl ...
Synopsis Moderate: openssl security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for openssl is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sy ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2437 Security Release Type/Severity Security Advisory: Important Topic Red Hat JBoss Core Services Pack Apache Server 2437 zip releasefor RHEL 6, RHEL 7 and Microsoft Windows is availableRed Hat Product Security has rated this update as ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2437 Security Release on RHEL 6 Type/Severity Security Advisory: Important Topic Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2437 and fix several bugs, and add various enhancements are now available for R ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2437 Security Release on RHEL 7 Type/Severity Security Advisory: Important Topic An update is now available for JBoss Core Services on RHEL 7Red Hat Product Security has rated this update as having a security impact of Important A Common ...
Several local side channel attacks and a denial of service via large Diffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit For the stable distribution (stretch), these problems have been fixed in version 102q-1~deb9u1 Going forward, openssl10 security updates for stretch will be based on the 102x upstream relea ...
Several local side channel attacks and a denial of service via large Diffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit For the stable distribution (stretch), these problems have been fixed in version 110j-1~deb9u1 Going forward, openssl security updates for stretch will be based on the 110x upstream releases ...
Several security issues were fixed in OpenSSL ...
OpenSSL could allow access to sensitve information ...
OpenSSL could allow access to sensitve information ...
Several security issues were fixed in OpenSSL ...
bn_sqrx8x_internal carry bug on x86_64There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 102m and 110 before 110g No EC algorithms are affected Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely Attacks agai ...
RSA key generation cache timing vulnerability in crypto/rsa/rsa_genc allows attackers to recover private keys:OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key (CVE-2018-0 ...
OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key ...
A cache-timing side channel attack in the RSA key generation algorithm has been found in OpenSSL <= 110h and <= 102o An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key ...
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack (CVE-2018-0737) An attacker could exploit this vulnerability to recover the private key (Vulnerability ID: HWPSIRT-2018-06015) Huawei has released software updates to fix this vulnerability This advisory is available at the followi ...
Log Correlation Engine leverages third-party software to help provide underlying functionality One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potent ...
Nessus leverages third-party software to help provide underlying functionality One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of th ...
Nessus leverages third-party software to help provide underlying functionality One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of th ...
SecurityCenter leverages third-party software to help provide underlying functionality Two separate third-party components (PHP and OpenSSL) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address ...

Github Repositories

Usefull SSL (OpenSSL & BoringSSL) & Nginx Patch Bundle For Chinese speakers you may refer to this 中文教程 For OpenSSL OpenSSL 110h wget wwwopensslorg/source/openssl-110htargz && tar zxf openssl-110htargz && cd openssl-110h # "double" ecdhx25519 performance on 64-bit platforms Upstream openssl

Usefull SSL (OpenSSL & BoringSSL) & Nginx Patch Bundle For Chinese speakers you may refer to this 中文教程 For OpenSSL OpenSSL 110h wget wwwopensslorg/source/openssl-110htargz && tar zxf openssl-110htargz && cd openssl-110h # "double" ecdhx25519 performance on 64-bit platforms Upstream openssl

sslpatch for openssl & nginx

Usefull SSL (OpenSSL & BoringSSL) & Nginx Patch Bundle For Chinese speakers you may refer to this 中文教程 For OpenSSL OpenSSL 110h wget wwwopensslorg/source/openssl-110htargz && tar zxf openssl-110htargz && cd openssl-110h # "double" ecdhx25519 performance on 64-bit platforms Upstream openssl

TLS - what can go wrong?

TLS - what can go wrong? Key generation Debian weak keys ROCA Shared prime factors (mining ps and qs) Shared non-private keys (eg using default keys shipped with applications) RSA encryption handshake Bleichenbacher, Klima, ROBOT etc attacks SSLv2 Bleichenbacher attack (DROWN) RSA signature handshake RSA-CRT bug / modexp miscalculation (signature generation) Bleichenbac

References

CWE-327https://www.openssl.org/news/secadv/20180416.txthttp://www.securitytracker.com/id/1040685http://www.securityfocus.com/bid/103766https://usn.ubuntu.com/3628-2/https://usn.ubuntu.com/3628-1/https://usn.ubuntu.com/3692-2/https://usn.ubuntu.com/3692-1/https://security.netapp.com/advisory/ntap-20180726-0003/https://lists.debian.org/debian-lts-announce/2018/07/msg00043.htmlhttps://nodejs.org/en/blog/vulnerability/august-2018-security-releases/https://www.tenable.com/security/tns-2018-12https://securityadvisories.paloaltonetworks.com/Home/Detail/133http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlhttps://www.tenable.com/security/tns-2018-14https://www.tenable.com/security/tns-2018-13https://access.redhat.com/errata/RHSA-2018:3221https://access.redhat.com/errata/RHSA-2018:3505https://security.gentoo.org/glsa/201811-21https://www.debian.org/security/2018/dsa-4348https://www.debian.org/security/2018/dsa-4355https://www.tenable.com/security/tns-2018-17https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttps://access.redhat.com/errata/RHSA-2019:3935https://access.redhat.com/errata/RHSA-2019:3933https://access.redhat.com/errata/RHSA-2019:3932https://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://www.oracle.com//security-alerts/cpujul2021.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=349a41da1ad88ad87825414752a8ff5fdd6a6c3fhttps://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895844https://nvd.nist.govhttps://usn.ubuntu.com/3692-1/https://access.redhat.com/errata/RHSA-2018:3221https://www.debian.org/security/./dsa-4355