MatrixSSL 4.2.1 and previous versions contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
matrixssl matrixssl |