CVE-2024-0202

A security vulnerability has been identified in the cryptlib cryptographic library when cryptlib is compiled with the support for RSA key exchange ciphersuites in TLS (by setting the USE_RSA_SUITES define), it will be vulnerable to the timing variant of the Bleichenbacher attack. An attacker that is able to perform a large number of connections to the server will be able to decrypt RSA ciphertexts or forge signatures using server's certificate. THIS CVE ID IS CURRENTLY DISPUTED - MAINTAINER NOTE: There are only two situations where it's enabled, one is for fuzz-testing to exercise code paths that wouldn't otherwise be available, the other is for static source code analysis with tools like Coverity and Prefast, again to open up code paths that otherwise wouldn't be available. It can also be enabled manually in two specific test builds just to make sure the code still compiles OK, to avoid bit rot and verify that the fuzz-testing build will compile without errors.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=2256518 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2256518 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cryptlib:cryptlib:*:*:*:*:*:*:*:*

History

16 Mar 2026, 20:16

Type Values Removed Values Added
Summary (en) A security vulnerability has been identified in the cryptlib cryptographic library when cryptlib is compiled with the support for RSA key exchange ciphersuites in TLS (by setting the USE_RSA_SUITES define), it will be vulnerable to the timing variant of the Bleichenbacher attack. An attacker that is able to perform a large number of connections to the server will be able to decrypt RSA ciphertexts or forge signatures using server's certificate. (en) A security vulnerability has been identified in the cryptlib cryptographic library when cryptlib is compiled with the support for RSA key exchange ciphersuites in TLS (by setting the USE_RSA_SUITES define), it will be vulnerable to the timing variant of the Bleichenbacher attack. An attacker that is able to perform a large number of connections to the server will be able to decrypt RSA ciphertexts or forge signatures using server's certificate. THIS CVE ID IS CURRENTLY DISPUTED - MAINTAINER NOTE: There are only two situations where it's enabled, one is for fuzz-testing to exercise code paths that wouldn't otherwise be available, the other is for static source code analysis with tools like Coverity and Prefast, again to open up code paths that otherwise wouldn't be available. It can also be enabled manually in two specific test builds just to make sure the code still compiles OK, to avoid bit rot and verify that the fuzz-testing build will compile without errors.

21 Nov 2024, 08:46

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2256518 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2256518 - Issue Tracking, Third Party Advisory

13 Feb 2024, 18:31

Type Values Removed Values Added
CWE CWE-203
References () https://bugzilla.redhat.com/show_bug.cgi?id=2256518 - () https://bugzilla.redhat.com/show_bug.cgi?id=2256518 - Issue Tracking, Third Party Advisory
First Time Cryptlib cryptlib
Cryptlib
CPE cpe:2.3:a:cryptlib:cryptlib:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

05 Feb 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-05 21:15

Updated : 2026-03-16 20:16


NVD link : CVE-2024-0202

Mitre link : CVE-2024-0202

CVE.ORG link : CVE-2024-0202


JSON object : View

Products Affected

cryptlib

  • cryptlib
CWE
CWE-208

Observable Timing Discrepancy

CWE-203

Observable Discrepancy