Vulnerability Details CVE-2023-6935
wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure:
--enable-all CFLAGS="-DWOLFSSL_STATIC_RSA"
The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6. Therefore the default build since 3.6.6, even with "--enable-all", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent.
The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.7%
CVSS Severity
CVSS v3 Score 5.9
Products affected by CVE-2023-6935
-
cpe:2.3:a:wolfssl:wolfssl:3.12.2
-
cpe:2.3:a:wolfssl:wolfssl:3.13.0
-
cpe:2.3:a:wolfssl:wolfssl:3.13.2
-
cpe:2.3:a:wolfssl:wolfssl:3.13.3
-
cpe:2.3:a:wolfssl:wolfssl:3.14.0
-
cpe:2.3:a:wolfssl:wolfssl:3.14.2
-
cpe:2.3:a:wolfssl:wolfssl:3.14.4
-
cpe:2.3:a:wolfssl:wolfssl:3.14.5
-
cpe:2.3:a:wolfssl:wolfssl:3.15.0
-
cpe:2.3:a:wolfssl:wolfssl:3.15.3
-
cpe:2.3:a:wolfssl:wolfssl:3.15.5
-
cpe:2.3:a:wolfssl:wolfssl:3.15.6
-
cpe:2.3:a:wolfssl:wolfssl:3.15.7
-
cpe:2.3:a:wolfssl:wolfssl:3.15.8
-
cpe:2.3:a:wolfssl:wolfssl:4.0
-
cpe:2.3:a:wolfssl:wolfssl:4.0.0
-
cpe:2.3:a:wolfssl:wolfssl:4.1.0
-
cpe:2.3:a:wolfssl:wolfssl:4.2.0
-
cpe:2.3:a:wolfssl:wolfssl:4.2.0c
-
cpe:2.3:a:wolfssl:wolfssl:4.3.0
-
cpe:2.3:a:wolfssl:wolfssl:4.4.0
-
cpe:2.3:a:wolfssl:wolfssl:4.5.0
-
cpe:2.3:a:wolfssl:wolfssl:4.6.0
-
cpe:2.3:a:wolfssl:wolfssl:4.7.0
-
cpe:2.3:a:wolfssl:wolfssl:4.8.0
-
cpe:2.3:a:wolfssl:wolfssl:4.8.1
-
cpe:2.3:a:wolfssl:wolfssl:5.0.0
-
cpe:2.3:a:wolfssl:wolfssl:5.1.0
-
cpe:2.3:a:wolfssl:wolfssl:5.1.1
-
cpe:2.3:a:wolfssl:wolfssl:5.2.0
-
cpe:2.3:a:wolfssl:wolfssl:5.2.1
-
cpe:2.3:a:wolfssl:wolfssl:5.3.0
-
cpe:2.3:a:wolfssl:wolfssl:5.4.0
-
cpe:2.3:a:wolfssl:wolfssl:5.5.0
-
cpe:2.3:a:wolfssl:wolfssl:5.5.1
-
cpe:2.3:a:wolfssl:wolfssl:5.5.2
-
cpe:2.3:a:wolfssl:wolfssl:5.5.3
-
cpe:2.3:a:wolfssl:wolfssl:5.5.4
-
cpe:2.3:a:wolfssl:wolfssl:5.6.0
-
cpe:2.3:a:wolfssl:wolfssl:5.6.2
-
cpe:2.3:a:wolfssl:wolfssl:5.6.3
-
cpe:2.3:a:wolfssl:wolfssl:5.6.4