CVE-2018-0495
moderate-risk
Published 2018-06-13
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
Do I need to act?
-
0.26% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (14)
References (42)
Third Party Advisory
http://www.securitytracker.com/id/1041144
Third Party Advisory
http://www.securitytracker.com/id/1041147
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3221
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505
Third Party Advisory
https://usn.ubuntu.com/3689-1/
Third Party Advisory
https://usn.ubuntu.com/3689-2/
Third Party Advisory
https://usn.ubuntu.com/3692-1/
Third Party Advisory
https://usn.ubuntu.com/3692-2/
Third Party Advisory
https://usn.ubuntu.com/3850-1/
Third Party Advisory
https://usn.ubuntu.com/3850-2/
Third Party Advisory
https://www.debian.org/security/2018/dsa-4231
and 22 more references
31
/ 100
moderate-risk
Severity
12/34 · Low
Exploitability
1/34 · Minimal
Exposure
18/34 · Moderate