Vulnerability Details : CVE-2024-0553
Potential exploit
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
Products affected by CVE-2024-0553
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-0553
0.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-0553
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | 2024-01-24 |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.2
|
3.6
|
Red Hat, Inc. | 2024-01-16 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
Red Hat, Inc. | 2024-01-25 |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
N/A
|
N/A
|
RedHat-CVE-2024-0553 | 2024-01-16 |
CWE ids for CVE-2024-0553
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2024-0553
-
https://access.redhat.com/errata/RHSA-2024:1082
RHSA-2024:1082 - Security Advisory - Red Hat Customer Portal
-
http://www.openwall.com/lists/oss-security/2024/01/19/3
oss-security - GnuTLS 3.8.3 released, fixes CVE-2024-0553 & CVE-2024-0567Mailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:0533
RHSA-2024:0533 - Security Advisory - Red Hat Customer Portal
-
https://security.netapp.com/advisory/ntap-20240202-0011/
January 2024 GnuTLS Vulnerabilities in NetApp Products | NetApp Product Security
-
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
[gnutls-help] gnutls 3.8.3Mailing List
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
[SECURITY] Fedora 39 Update: gnutls-3.8.3-1.fc39 - package-announce - Fedora Mailing-Lists
-
https://access.redhat.com/errata/RHSA-2024:1383
RHSA-2024:1383 - Security Advisory - Red Hat Customer Portal
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
[SECURITY] Fedora 38 Update: gnutls-3.8.3-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://access.redhat.com/security/cve/CVE-2024-0553
CVE-2024-0553- Red Hat Customer PortalThird Party Advisory
-
https://gitlab.com/gnutls/gnutls/-/issues/1522
GnuTLS has incomplete fix for CVE-2023-5981 (#1522) · Issues · gnutls / GnuTLS · GitLabExploit;Issue Tracking;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2024:1108
RHSA-2024:1108 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=2258412
2258412 – (CVE-2024-0553) CVE-2024-0553 gnutls: incomplete fix for CVE-2023-5981Issue Tracking;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:0796
RHSA-2024:0796 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0627
RHSA-2024:0627 - Security Advisory - Red Hat Customer Portal
-
https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html
[SECURITY] [DLA 3740-1] gnutls28 security update
-
https://access.redhat.com/errata/RHSA-2024:2094
RHSA-2024:2094 - Security Advisory - Red Hat Customer Portal
Jump to