CVE-2023-24532
low-risk
Published 2023-03-08
The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh.
Do I need to act?
-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (9)
Patch
https://go.dev/cl/471255
Issue Tracking
https://go.dev/issue/58647
Third Party Advisory
https://pkg.go.dev/vuln/GO-2023-1621
Patch
https://go.dev/cl/471255
Issue Tracking
https://go.dev/issue/58647
Third Party Advisory
https://pkg.go.dev/vuln/GO-2023-1621
26
/ 100
low-risk
Severity
21/34 · High
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal