5
CVSSv2

CVE-2021-43398

Published: 04/11/2021 Updated: 11/04/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Crypto++ (aka Cryptopp) 8.6.0 and previous versions contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow malicious users to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cryptopp crypto\\+\\+

Vendor Advisories

Debian Bug report logs - #1000227 libcrypto++: CVE-2021-43398 Package: src:libcrypto++; Maintainer for src:libcrypto++ is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 19 Nov 2021 22:24:04 UTC Severity: important Tags: security, upstream Found in version ...
Crypto++ 860 and earlier contains a timing leakage in MakePublicKey() There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key This might allow attackers to conduct timing attacks ...