CVE-2024-26306

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
Configurations

No configuration.

History

28 Feb 2025, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250228-0007/ -

10 Feb 2025, 23:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
CWE CWE-385

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://downloads.es.net/pub/iperf/esnet-secadv-2024-0001.txt.asc - () https://downloads.es.net/pub/iperf/esnet-secadv-2024-0001.txt.asc -
References () https://github.com/esnet/iperf/releases/tag/3.17 - () https://github.com/esnet/iperf/releases/tag/3.17 -

20 Aug 2024, 05:15

Type Values Removed Values Added
References
  • () https://www.insyde.com/security-pledge/SA-2024005 -
Summary
  • (es) iPerf3 anterior a 3.17, cuando se usa con OpenSSL anterior a 3.2.0 como servidor con autenticación RSA, permite un canal lateral de temporización en las operaciones de descifrado RSA. Este canal lateral podría ser suficiente para que un atacante recupere el texto sin formato de las credenciales. Requiere que el atacante envíe una gran cantidad de mensajes para descifrarlos, como se describe en "Everlasting ROBOT: the Marvin Attack" de Hubert Kario.

14 May 2024, 15:08

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 15:08

Updated : 2025-02-28 13:15


NVD link : CVE-2024-26306

Mitre link : CVE-2024-26306

CVE.ORG link : CVE-2024-26306


JSON object : View

Products Affected

No product.

CWE
CWE-385

Covert Timing Channel