Vulnerability Details : CVE-2023-24532
The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh.
Products affected by CVE-2023-24532
- cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
- cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-24532
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-24532
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2023-24532
-
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.Assigned by:
- nvd@nist.gov (Primary)
- security@golang.org (Secondary)
References for CVE-2023-24532
-
https://groups.google.com/g/golang-announce/c/3-TpUx48iQY
[security] Go 1.20.2 and Go 1.19.7 are releasedMailing List;Release Notes
-
https://pkg.go.dev/vuln/GO-2023-1621
GO-2023-1621 - Go PackagesThird Party Advisory
-
https://go.dev/issue/58647
crypto/elliptic: specific unreduced P-256 scalars produce incorrect results · Issue #58647 · golang/go · GitHubIssue Tracking;Patch
-
https://go.dev/cl/471255
crypto/internal/nistec: reduce P-256 scalar (471255) · Gerrit Code ReviewPatch
Jump to