Vulnerability Details CVE-2013-1623
The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.009
EPSS Ranking 75.0%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2013-1623
-
-
cpe:2.3:a:yassl:cyassl:0.2.0
-
cpe:2.3:a:yassl:cyassl:0.3.0
-
cpe:2.3:a:yassl:cyassl:0.4.0
-
cpe:2.3:a:yassl:cyassl:0.5.0
-
cpe:2.3:a:yassl:cyassl:0.5.5
-
cpe:2.3:a:yassl:cyassl:0.6.0
-
cpe:2.3:a:yassl:cyassl:0.6.2
-
cpe:2.3:a:yassl:cyassl:0.6.3
-
cpe:2.3:a:yassl:cyassl:0.8.0
-
cpe:2.3:a:yassl:cyassl:0.9.0
-
cpe:2.3:a:yassl:cyassl:0.9.6
-
cpe:2.3:a:yassl:cyassl:0.9.8
-
cpe:2.3:a:yassl:cyassl:0.9.9
-
cpe:2.3:a:yassl:cyassl:1.0.0
-
cpe:2.3:a:yassl:cyassl:1.0.2
-
cpe:2.3:a:yassl:cyassl:1.0.3
-
cpe:2.3:a:yassl:cyassl:1.0.6
-
cpe:2.3:a:yassl:cyassl:1.1.0
-
cpe:2.3:a:yassl:cyassl:1.2.0
-
cpe:2.3:a:yassl:cyassl:1.3.0
-
cpe:2.3:a:yassl:cyassl:1.4.0
-
cpe:2.3:a:yassl:cyassl:1.5.0
-
cpe:2.3:a:yassl:cyassl:1.5.4
-
cpe:2.3:a:yassl:cyassl:1.5.6
-
cpe:2.3:a:yassl:cyassl:1.6.0
-
cpe:2.3:a:yassl:cyassl:1.6.5
-
cpe:2.3:a:yassl:cyassl:1.8.0
-
cpe:2.3:a:yassl:cyassl:1.9.0
-
cpe:2.3:a:yassl:cyassl:2.0.0
-
cpe:2.3:a:yassl:cyassl:2.0.2
-
cpe:2.3:a:yassl:cyassl:2.0.6
-
cpe:2.3:a:yassl:cyassl:2.0.8
-
cpe:2.3:a:yassl:cyassl:2.2.0
-
cpe:2.3:a:yassl:cyassl:2.3.0
-
cpe:2.3:a:yassl:cyassl:2.4.0