5.9
CVSSv3

CVE-2021-4160

Published: 28/01/2022 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 3.0.0

openssl openssl

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

oracle jd edwards world security a9.4

oracle peoplesoft enterprise peopletools 8.58

oracle peoplesoft enterprise peopletools 8.59

oracle jd edwards enterpriseone tools 9.2.6.3

oracle health sciences inform publisher 6.3.1.1

oracle health sciences inform publisher 6.2.1.1

siemens sinec ins 1.0

siemens sinec ins

oracle enterprise manager ops center 12.4.0.0

Vendor Advisories

Tavis Ormandy discovered that the BN_mod_sqrt() function of OpenSSL could be tricked into an infinite loop This could result in denial of service via malformed certificates Additional details can be found in the upstream advisory: wwwopensslorg/news/secadv/20220315txt In addition this update corrects a carry propagation bug specific to ...
There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure Many EC algorithms are affected, including some of the TLS 13 default curves Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys Analysis suggests that attacks against RSA and DSA as a result ...

ICS Advisories

Github Repositories

Simple NodeJS Helloworld app that has a vulnerability we can fix as part of a demo

nodejs-helloworld Simple NodeJS Helloworld app that has a vulnerability we can fix as part of a demo Steps Kick off a pipeline build and show result in new scanning engine by filtering for Vulnerabilities that have a fix and you should see CVE-2002-0078 and CVE-2021-4160 which are both caused by libessl11 version 111k-1+deb11u1 Update the Dockerfile to update this package b

GitHub Action: NeuVector Vulnerability Scan Action Scans a container image for vulnerabilities with NeuVector Usage Scan locally built container image name: build on: push: branches: - main jobs: build: name: Build runs-on: ubuntu-latest steps: - name: Checkout code uses: actions/checkout@v2 - name: Build image run: |

NeuVector vulnerability scan GitHub action

GitHub Action: NeuVector Vulnerability Scan Action Scans a container image for vulnerabilities with NeuVector Usage Scan locally built container image name: build on: push: branches: - main jobs: build: name: Build runs-on: ubuntu-latest steps: - name: Checkout code uses: actions/checkout@v2 - name: Build image run: |

GitHub Action for container image scans with NeuVector

GitHub Action: NeuVector Image Scan Scans a container image for vulnerabilities with NeuVector Usage Scan locally built container image name: build on: push: branches: - main jobs: build: name: Build runs-on: ubuntu-latest steps: - name: Checkout code uses: actions/checkout@v2 - name: Build image run: | docke