CVE-2015-7744
moderate-risk
Published 2016-01-22
wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
Do I need to act?
~
2.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
References (18)
Release Notes
http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Broken Link
http://www.securitytracker.com/id/1034708
Release Notes
http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Broken Link
http://www.securitytracker.com/id/1034708
36
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
6/34 · Minimal
Exposure
12/34 · Low