Skip to content

Marvin Attack: potential key recovery through timing sidechannels

Moderate severity GitHub Reviewed Published Nov 28, 2023 in RustCrypto/RSA • Updated Dec 15, 2023

Package

cargo rsa (Rust)

Affected versions

<= 0.9.6

Patched versions

None

Description

Impact

Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key.

Patches

No patch is yet available, however work is underway to migrate to a fully constant-time implementation.

Workarounds

The only currently available workaround is to avoid using the rsa crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer is fine.

References

This vulnerability was discovered as part of the "Marvin Attack", which revealed several implementations of RSA including OpenSSL had not properly mitigated timing sidechannel attacks.

References

@tarcieri tarcieri published to RustCrypto/RSA Nov 28, 2023
Published by the National Vulnerability Database Nov 28, 2023
Published to the GitHub Advisory Database Nov 28, 2023
Reviewed Nov 28, 2023
Last updated Dec 15, 2023

Severity

Moderate
5.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE ID

CVE-2023-49092

GHSA ID

GHSA-c38w-74pg-36hr

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.