CVE-2023-32690

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32690
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32690.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-32690
Related
  • GHSA-56h8-4gv5-jf2c
Published
2023-06-01T17:15:09Z
Modified
2025-07-29T10:54:32.026835Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

libspdm is a sample implementation that follows the DMTF SPDM specifications. Prior to versions 2.3.3 and 3.0, following a successful CAPABILITIES response, a libspdm Requester stores the Responder's CTExponent into its context without validation. If the Requester sends a request message that requires a cryptography operation by the Responder, such as CHALLENGE, libspdm will calculate the timeout value using the Responder's unvalidated CTExponent.

A patch is available in version 2.3.3. A workaround is also available. After completion of VCA, the Requester can check the value of the Responder's CTExponent. If it greater than or equal to 64, then the Requester can stop communication with the Responder.

References

Affected packages

Git / github.com/dmtf/libspdm

Affected ranges

Type
GIT
Repo
https://github.com/dmtf/libspdm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0

2.*

2.0.0
2.1.0
2.2.0
2.3.0
2.3.1
2.3.2