Skip to main content

CVE-2023-52323: n/a in n/a

Medium
VulnerabilityCVE-2023-52323cvecve-2023-52323
Published: Fri Jan 05 2024 (01/05/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.

AI-Powered Analysis

AILast updated: 07/04/2025, 02:26:01 UTC

Technical Analysis

CVE-2023-52323 is a medium-severity vulnerability affecting the PyCryptodome and pycryptodomex cryptographic libraries prior to version 3.19.1. These libraries are widely used in Python applications to provide cryptographic primitives. The vulnerability arises from side-channel leakage during OAEP (Optimal Asymmetric Encryption Padding) decryption operations. Specifically, the flaw allows an attacker to perform a Manger attack, a type of adaptive chosen ciphertext attack that exploits side-channel information to gradually reveal plaintext data encrypted with RSA-OAEP. The vulnerability is rooted in the implementation details of the OAEP decryption process, where timing or error message differences can leak information about the plaintext. The CVSS v3.1 base score is 5.9, indicating a medium severity level. The vector indicates the attack requires network access (AV:N), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) without affecting integrity or availability. No known exploits are currently reported in the wild, and no direct patches or vendor advisories are linked, but upgrading to PyCryptodome/pycryptodomex version 3.19.1 or later is recommended to remediate the issue. This vulnerability falls under CWE-203 (Information Exposure Through Discrepancy), highlighting that subtle differences in processing can leak sensitive information. Given the widespread use of these libraries in Python-based applications, especially those handling cryptographic operations, this vulnerability could be leveraged by remote attackers to extract sensitive encrypted data if the vulnerable decryption function is exposed to attacker-controlled ciphertexts.

Potential Impact

For European organizations, the impact of CVE-2023-52323 can be significant, particularly for those relying on Python applications that use PyCryptodome or pycryptodomex for RSA-OAEP encryption/decryption. Confidentiality of sensitive data such as personal information, intellectual property, or cryptographic keys could be compromised if attackers exploit the side-channel leakage. This is especially critical for sectors like finance, healthcare, government, and critical infrastructure, where encrypted data protection is paramount under regulations like GDPR. Although the attack complexity is high and no known exploits exist yet, the vulnerability allows remote exploitation without authentication or user interaction, increasing the risk profile. Organizations using these libraries in web services, APIs, or cloud environments where attacker-controlled ciphertexts might be submitted are at higher risk. The vulnerability does not affect data integrity or availability, but the loss of confidentiality could lead to data breaches, regulatory penalties, and reputational damage. The medium severity rating suggests that while the threat is not immediately critical, it requires timely attention to prevent potential exploitation.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all Python applications and services using PyCryptodome or pycryptodomex libraries, especially those performing RSA-OAEP decryption. 2) Upgrade these libraries to version 3.19.1 or later, where the vulnerability is fixed. 3) Review application code to ensure that decryption operations are not exposed to untrusted or attacker-controlled ciphertext inputs. 4) Implement additional cryptographic best practices such as limiting the exposure of decryption endpoints, applying rate limiting, and monitoring for anomalous decryption requests that could indicate an attempted Manger attack. 5) Conduct code audits and penetration testing focused on cryptographic operations to detect any side-channel leakage or improper error handling. 6) For critical systems, consider using hardware security modules (HSMs) or cryptographic libraries with proven side-channel resistance. 7) Maintain up-to-date threat intelligence and vulnerability management processes to quickly respond to any emerging exploits related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff3d5

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 2:26:01 AM

Last updated: 8/17/2025, 3:28:17 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats