wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc
, --enable-sp
, or--enable-sp-math
) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
{ "nvd_published_at": "2019-10-03T14:15:00Z", "severity": "MODERATE", "github_reviewed_at": "2023-07-17T22:25:50Z", "github_reviewed": true, "cwe_ids": [ "CWE-203" ] }