CVE-2018-0735

high-risk
Published 2018-10-29

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

Do I need to act?

~
7.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10 Medium
NETWORK / HIGH complexity

References (30)

Third Party Advisory https://usn.ubuntu.com/3840-1/
and 10 more references
52
/ 100
high-risk
Severity 18/34 · Moderate
Exploitability 10/34 · Low
Exposure 24/34 · High