Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0553: Observable Discrepancy

0
High
VulnerabilityCVE-2024-0553cvecve-2024-0553
Published: Tue Jan 16 2024 (01/16/2024, 11:40:50 UTC)
Source: CVE Database V5

Description

CVE-2024-0553 is a high-severity timing side-channel vulnerability in GnuTLS version 3. 8. 0 affecting the RSA-PSK ClientKeyExchange process. The vulnerability arises because response times differ when processing malformed ciphertexts compared to correctly padded ciphertexts, enabling remote attackers to infer sensitive cryptographic information. This flaw can lead to leakage of secret key material during the RSA-PSK key exchange, potentially compromising confidentiality. No authentication or user interaction is required, and exploitation can be performed remotely over the network. Although no known exploits are currently reported in the wild, the vulnerability is an incomplete fix for a prior issue (CVE-2023-5981), indicating ongoing risk. European organizations using GnuTLS 3. 8. 0 in critical infrastructure or services relying on RSA-PSK key exchange are at risk.

AI-Powered Analysis

AILast updated: 11/27/2025, 18:35:39 UTC

Technical Analysis

CVE-2024-0553 identifies a timing side-channel vulnerability in GnuTLS version 3.8.0, specifically within the RSA-PSK ClientKeyExchange message processing. The vulnerability stems from observable discrepancies in response times when the server processes malformed ciphertexts versus ciphertexts with correct PKCS#1 v1.5 padding. This timing difference can be exploited remotely by an attacker to gradually infer sensitive cryptographic information, such as private keys or session secrets, by measuring response delays. The issue is a partial resolution of a previous vulnerability, CVE-2023-5981, indicating that the underlying flaw in handling RSA-PSK ciphertexts has not been fully mitigated. The attack does not require any privileges or user interaction, making it accessible to unauthenticated remote attackers. The vulnerability affects confidentiality but does not impact integrity or availability. The CVSS v3.1 score of 7.5 reflects the high risk due to network attack vector, low attack complexity, and no required privileges. GnuTLS is widely used in open-source software stacks, embedded systems, and network appliances, making this vulnerability relevant to many environments that rely on secure TLS communications using RSA-PSK key exchange. No public exploits have been reported yet, but the potential for sensitive data leakage warrants prompt attention.

Potential Impact

For European organizations, the primary impact of CVE-2024-0553 is the potential compromise of confidentiality in TLS sessions that use GnuTLS 3.8.0 with RSA-PSK key exchange. This can lead to exposure of sensitive data, including cryptographic keys and session secrets, which may enable further attacks such as session hijacking or decryption of intercepted communications. Critical sectors such as finance, healthcare, government, and telecommunications that rely on secure TLS communications could face data breaches or espionage risks. The vulnerability could also undermine trust in secure communications and compliance with data protection regulations like GDPR if sensitive personal or business data is exposed. Since the flaw is a timing side-channel, attackers with network access can exploit it without needing credentials or user interaction, increasing the threat surface. The incomplete fix status suggests that organizations must remain vigilant for follow-up patches and advisories. Systems embedded in IoT devices or network appliances using vulnerable GnuTLS versions may be particularly susceptible due to limited patching capabilities.

Mitigation Recommendations

1. Immediately identify and inventory all systems running GnuTLS version 3.8.0, especially those using RSA-PSK key exchange. 2. Apply official patches or updates from GnuTLS maintainers as soon as they become available to fully resolve the timing discrepancy. 3. If patches are not yet available, consider disabling RSA-PSK key exchange in TLS configurations and switch to more secure key exchange methods such as ECDHE. 4. Implement network-level monitoring to detect unusual timing patterns or repeated malformed ciphertext attempts that may indicate exploitation attempts. 5. Employ constant-time cryptographic operations where possible to reduce timing side-channel leakage. 6. Conduct penetration testing and code audits focusing on TLS implementations to detect similar timing vulnerabilities. 7. For embedded or legacy systems where patching is difficult, isolate vulnerable devices from untrusted networks or restrict access to trusted users only. 8. Maintain up-to-date threat intelligence and subscribe to security advisories related to GnuTLS and TLS vulnerabilities. 9. Educate security teams about timing side-channel risks and ensure incident response plans include scenarios involving cryptographic key leakage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-01-15T04:35:34.146Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5c4ce672cd9080e8d3d1

Added to database: 11/20/2025, 6:22:04 PM

Last enriched: 11/27/2025, 6:35:39 PM

Last updated: 1/8/2026, 7:37:07 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats