Timing Side Channel Vulnerability in MatrixSSL 4.2.1 and Earlier: Private Key Leakage in ECDSA Signature Generation

Timing Side Channel Vulnerability in MatrixSSL 4.2.1 and Earlier: Private Key Leakage in ECDSA Signature Generation

CVE-2019-13629 · MEDIUM Severity

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.

Learn more about our Web Application Penetration Testing UK.