CVE-2023-46809

Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
Configurations

No configuration.

History

04 Nov 2025, 19:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/03/msg00029.html -

04 Nov 2025, 17:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/09/msg00029.html -

09 Sep 2024, 18:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.4
CWE CWE-385

09 Sep 2024, 13:03

Type Values Removed Values Added
Summary
  • (es) Las versiones de Node.js que incluyen una versión sin parches de OpenSSL o se ejecutan contra una versión vinculada dinámicamente de OpenSSL que no tiene parches son vulnerables al ataque Marvin - https://people.redhat.com/~hkario/marvin/, si se permite el relleno PCKS #1 v1.5 al realizar el descifrado RSA usando una clave privada.

07 Sep 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-07 16:15

Updated : 2025-11-04 19:16


NVD link : CVE-2023-46809

Mitre link : CVE-2023-46809

CVE.ORG link : CVE-2023-46809


JSON object : View

Products Affected

No product.

CWE
CWE-385

Covert Timing Channel