CVE-2019-13629

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
Configurations

Configuration 1 (hide)

cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-10-03 14:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-13629

Mitre link : CVE-2019-13629

CVE.ORG link : CVE-2019-13629


JSON object : View

Products Affected

matrixssl

  • matrixssl
CWE
CWE-203

Observable Discrepancy

CWE-327

Use of a Broken or Risky Cryptographic Algorithm