Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0914: Covert Timing Channel

0
Medium
VulnerabilityCVE-2024-0914cvecve-2024-0914
Published: Wed Jan 31 2024 (01/31/2024, 04:53:28 UTC)
Source: CVE Database V5

Description

A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:21:45 UTC

Technical Analysis

CVE-2024-0914 identifies a timing side-channel vulnerability in the opencryptoki package version 3.0.0, specifically during the processing of RSA ciphertexts padded with PKCS#1 v1.5. The vulnerability arises because the cryptographic operations leak timing information that can be measured by an attacker to infer sensitive data. This side-channel can be exploited to decrypt RSA ciphertexts or forge RSA signatures without access to the private key, undermining the confidentiality and authenticity guarantees of RSA. The attack does not require user interaction or authentication but has a high complexity due to the need for precise timing measurements and repeated cryptographic queries. The vulnerability is notable because it targets a widely used open-source cryptographic toolkit, which is often integrated into enterprise and government systems for secure communications and digital signatures. The CVSS score of 5.9 reflects the medium severity, balancing the high impact on confidentiality with the difficulty of exploitation and lack of known active exploits. No patches or fixes are currently linked, indicating that users must monitor vendor advisories closely. The vulnerability highlights the critical importance of implementing constant-time cryptographic algorithms to prevent timing side-channels, especially in legacy padding schemes like PKCS#1 v1.5, which are known to be vulnerable to various attacks.

Potential Impact

The primary impact of CVE-2024-0914 is the potential unauthorized decryption of RSA-encrypted data and the forging of RSA signatures, which compromises confidentiality and authenticity. This can lead to data breaches, unauthorized access to sensitive information, and the acceptance of fraudulent digital signatures, undermining trust in secure communications and transactions. Organizations relying on opencryptoki 3.0.0 for cryptographic operations in critical systems such as secure messaging, authentication, or digital signing are at risk. The medium severity score reflects that while exploitation is complex, successful attacks could have significant consequences, especially in sectors like finance, government, and critical infrastructure. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. The vulnerability could also facilitate advanced persistent threats (APTs) targeting high-value assets by enabling covert data extraction or signature forgery. Overall, the threat could disrupt secure operations and erode confidence in cryptographic protections if left unmitigated.

Mitigation Recommendations

To mitigate CVE-2024-0914, organizations should: 1) Monitor for and apply official patches or updates from the opencryptoki maintainers as soon as they become available. 2) If patches are not yet available, consider disabling or limiting the use of opencryptoki 3.0.0 for RSA PKCS#1 v1.5 operations, or migrate to more secure cryptographic libraries that implement constant-time algorithms. 3) Transition away from PKCS#1 v1.5 padding to more secure padding schemes such as RSA-PSS, which are less susceptible to timing attacks. 4) Implement strict access controls to cryptographic services to reduce the attack surface and prevent unauthorized timing measurements. 5) Employ network-level protections to detect and block suspicious repeated cryptographic queries that may indicate timing attack attempts. 6) Conduct regular security audits and penetration testing focusing on cryptographic implementations to identify and remediate side-channel vulnerabilities. 7) Educate developers and system administrators about the risks of timing side-channels and best practices for secure cryptographic coding.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-25T22:28:25.811Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8557cba0e608b4fb1eedd

Added to database: 10/10/2025, 12:38:20 AM

Last enriched: 2/27/2026, 9:21:45 AM

Last updated: 3/22/2026, 4:46:13 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses