JLSEC-2025-223

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-223.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-223.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2025-223
Upstream
Published
2025-11-21T15:59:04.054Z
Modified
2025-11-21T16:18:02.623363Z
Summary
An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2
Details

An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

Database specific
{
    "sources": [
        {
            "modified": "2025-11-04T19:16:33.367Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-23170",
            "id": "CVE-2024-23170",
            "imported": "2025-11-20T23:04:02.691Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23170",
            "published": "2024-01-31T08:15:42.220Z"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / MbedTLS_jll

Package

Name
MbedTLS_jll
Purl
pkg:julia/MbedTLS_jll?uuid=c8ffd9c3-330d-5841-b78e-0817d7145fa1

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.28.10+0