ROHNP: Memory-Cache Side-Channel Attack on DSA Signatures in BoringSSL

ROHNP: Memory-Cache Side-Channel Attack on DSA Signatures in BoringSSL

CVE-2018-12440 · LOW Severity

AV:L/AC:M/AU:N/C:P/I:N/A:N

BoringSSL through 2018-06-14 allows a memory-cache side-channel attack on DSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a DSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Learn more about our Physical Security Assessment.