When computing a shared secret or point multiplication on the NIST P-256 curve that results in an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output may cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario or incorrect choice of session key in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.
Published 2022-07-29 19:15:08
Updated 2022-08-05 18:48:46
View at NVD,   CVE.org
Vulnerability category: Denial of service

Exploit prediction scoring system (EPSS) score for CVE-2022-23003

Probability of exploitation activity in the next 30 days: 0.08%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 32 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2022-23003

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
5.3
MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.9
1.4
NIST
5.3
MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.9
1.4
Western Digital

CWE ids for CVE-2022-23003

  • The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
    Assigned by: nvd@nist.gov (Primary)
  • The product does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the product.
    Assigned by: psirt@wdc.com (Secondary)

References for CVE-2022-23003

Products affected by CVE-2022-23003

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!