CVE-2024-0202: Observable Timing Discrepancy
A security vulnerability has been identified in the cryptlib cryptographic library when cryptlib is compiled with the support for RSA key exchange ciphersuites in TLS (by setting the USE_RSA_SUITES define), it will be vulnerable to the timing variant of the Bleichenbacher attack. An attacker that is able to perform a large number of connections to the server will be able to decrypt RSA ciphertexts or forge signatures using server's certificate. THIS CVE ID IS CURRENTLY DISPUTED - MAINTAINER NOTE: There are only two situations where it's enabled, one is for fuzz-testing to exercise code paths that wouldn't otherwise be available, the other is for static source code analysis with tools like Coverity and Prefast, again to open up code paths that otherwise wouldn't be available. It can also be enabled manually in two specific test builds just to make sure the code still compiles OK, to avoid bit rot and verify that the fuzz-testing build will compile without errors.
AI Analysis
Technical Summary
CVE-2024-0202 identifies a timing side-channel vulnerability in the cryptlib cryptographic library version 3.4.7 when compiled with the USE_RSA_SUITES define, which enables RSA key exchange ciphersuites in TLS. This configuration exposes cryptlib to a timing variant of the Bleichenbacher attack, a well-known cryptanalytic attack against RSA PKCS#1 v1.5 padding. An attacker capable of initiating a large number of TLS connections to a vulnerable server can measure subtle timing discrepancies during RSA decryption operations. These timing differences can be exploited to gradually decrypt RSA ciphertexts or forge digital signatures using the server's certificate private key. The vulnerability is notable because it affects cryptlib's implementation of RSA key exchange, which is generally discouraged in favor of more secure key exchange methods like ECDHE. Importantly, the cryptlib maintainer notes that RSA suites are only enabled in specific test builds for fuzz-testing or static analysis purposes, and not in typical production builds. This limits the practical attack surface significantly. The CVSS v3.1 base score is 5.9 (medium severity), reflecting network attack vector, high attack complexity, no privileges or user interaction required, and high confidentiality impact but no integrity or availability impact. No patches or exploits are currently reported, and the vulnerability is disputed due to its limited enabled scenarios. Nevertheless, the presence of this vulnerability in any production environment with RSA suites enabled could lead to serious cryptographic compromise.
Potential Impact
If exploited, this vulnerability could allow attackers to decrypt sensitive RSA-encrypted data or forge signatures, undermining the confidentiality and authenticity guarantees of TLS sessions. This could lead to exposure of confidential communications, credential theft, or man-in-the-middle attacks. However, the impact is mitigated by the fact that RSA key exchange ciphersuites are rarely enabled in modern TLS deployments, and cryptlib typically disables them except in test builds. Organizations using cryptlib in legacy or specialized environments that enable RSA suites are at risk. The attack requires the ability to perform numerous TLS handshakes and measure timing precisely, which increases complexity and limits attacker feasibility. There is no known exploitation in the wild, reducing immediate risk. Nevertheless, the vulnerability highlights the dangers of enabling deprecated cryptographic options and the importance of using modern, secure key exchange methods. Failure to address this could result in compromise of server private keys and subsequent widespread security breaches.
Mitigation Recommendations
Organizations should verify whether cryptlib is compiled with RSA key exchange ciphersuites enabled (USE_RSA_SUITES define). If so, they should disable RSA suites in production builds to eliminate exposure to this timing attack. Upgrading to a cryptlib version that does not enable RSA suites by default or applying patches once available is recommended. Network defenders should monitor TLS handshake patterns for unusual connection volumes that could indicate attack attempts. Employing TLS configurations that prefer forward-secure key exchanges such as ECDHE or DHE will mitigate this class of attacks. Additionally, implementing constant-time cryptographic operations and side-channel resistant code paths can reduce timing leakages. Security teams should audit cryptographic libraries and build configurations regularly to ensure deprecated or test-only features are not enabled inadvertently. Finally, organizations should maintain up-to-date threat intelligence to respond promptly if exploit code emerges.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, China, India, Canada, Australia
CVE-2024-0202: Observable Timing Discrepancy
Description
A security vulnerability has been identified in the cryptlib cryptographic library when cryptlib is compiled with the support for RSA key exchange ciphersuites in TLS (by setting the USE_RSA_SUITES define), it will be vulnerable to the timing variant of the Bleichenbacher attack. An attacker that is able to perform a large number of connections to the server will be able to decrypt RSA ciphertexts or forge signatures using server's certificate. THIS CVE ID IS CURRENTLY DISPUTED - MAINTAINER NOTE: There are only two situations where it's enabled, one is for fuzz-testing to exercise code paths that wouldn't otherwise be available, the other is for static source code analysis with tools like Coverity and Prefast, again to open up code paths that otherwise wouldn't be available. It can also be enabled manually in two specific test builds just to make sure the code still compiles OK, to avoid bit rot and verify that the fuzz-testing build will compile without errors.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-0202 identifies a timing side-channel vulnerability in the cryptlib cryptographic library version 3.4.7 when compiled with the USE_RSA_SUITES define, which enables RSA key exchange ciphersuites in TLS. This configuration exposes cryptlib to a timing variant of the Bleichenbacher attack, a well-known cryptanalytic attack against RSA PKCS#1 v1.5 padding. An attacker capable of initiating a large number of TLS connections to a vulnerable server can measure subtle timing discrepancies during RSA decryption operations. These timing differences can be exploited to gradually decrypt RSA ciphertexts or forge digital signatures using the server's certificate private key. The vulnerability is notable because it affects cryptlib's implementation of RSA key exchange, which is generally discouraged in favor of more secure key exchange methods like ECDHE. Importantly, the cryptlib maintainer notes that RSA suites are only enabled in specific test builds for fuzz-testing or static analysis purposes, and not in typical production builds. This limits the practical attack surface significantly. The CVSS v3.1 base score is 5.9 (medium severity), reflecting network attack vector, high attack complexity, no privileges or user interaction required, and high confidentiality impact but no integrity or availability impact. No patches or exploits are currently reported, and the vulnerability is disputed due to its limited enabled scenarios. Nevertheless, the presence of this vulnerability in any production environment with RSA suites enabled could lead to serious cryptographic compromise.
Potential Impact
If exploited, this vulnerability could allow attackers to decrypt sensitive RSA-encrypted data or forge signatures, undermining the confidentiality and authenticity guarantees of TLS sessions. This could lead to exposure of confidential communications, credential theft, or man-in-the-middle attacks. However, the impact is mitigated by the fact that RSA key exchange ciphersuites are rarely enabled in modern TLS deployments, and cryptlib typically disables them except in test builds. Organizations using cryptlib in legacy or specialized environments that enable RSA suites are at risk. The attack requires the ability to perform numerous TLS handshakes and measure timing precisely, which increases complexity and limits attacker feasibility. There is no known exploitation in the wild, reducing immediate risk. Nevertheless, the vulnerability highlights the dangers of enabling deprecated cryptographic options and the importance of using modern, secure key exchange methods. Failure to address this could result in compromise of server private keys and subsequent widespread security breaches.
Mitigation Recommendations
Organizations should verify whether cryptlib is compiled with RSA key exchange ciphersuites enabled (USE_RSA_SUITES define). If so, they should disable RSA suites in production builds to eliminate exposure to this timing attack. Upgrading to a cryptlib version that does not enable RSA suites by default or applying patches once available is recommended. Network defenders should monitor TLS handshake patterns for unusual connection volumes that could indicate attack attempts. Employing TLS configurations that prefer forward-secure key exchanges such as ECDHE or DHE will mitigate this class of attacks. Additionally, implementing constant-time cryptographic operations and side-channel resistant code paths can reduce timing leakages. Security teams should audit cryptographic libraries and build configurations regularly to ensure deprecated or test-only features are not enabled inadvertently. Finally, organizations should maintain up-to-date threat intelligence to respond promptly if exploit code emerges.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fedora
- Date Reserved
- 2024-01-02T20:49:45.368Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ddab7ef31ef0b58f952
Added to database: 2/25/2026, 9:47:06 PM
Last enriched: 3/17/2026, 6:37:38 PM
Last updated: 4/11/2026, 2:49:42 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.