Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23170: n/a

0
Medium
VulnerabilityCVE-2024-23170cvecve-2024-23170
Published: Wed Jan 31 2024 (01/31/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:43:08 UTC

Technical Analysis

CVE-2024-23170 identifies a timing side-channel vulnerability in the RSA private key operations of Mbed TLS cryptographic library versions 2.x prior to 2.28.7 and 3.x prior to 3.5.2. The vulnerability arises because the implementation leaks timing information during RSA decryption operations, which can be measured by a local attacker to infer the plaintext. This attack is based on the research detailed in the 'Everlasting ROBOT: the Marvin Attack' by Hubert Kario, which demonstrates how repeated decryption requests can reveal sensitive data through subtle timing differences. Exploitation requires the attacker to have local access with limited privileges and the ability to send a large volume of decryption requests to the target system. The vulnerability impacts confidentiality by potentially exposing plaintext data but does not affect integrity or availability. The CVSS 3.1 score of 5.5 reflects a medium severity due to the local attack vector and required privileges. No user interaction is needed, but the attack scope is limited to systems running vulnerable Mbed TLS versions performing RSA private key operations. No known exploits have been reported in the wild, and while no direct patch links are provided, upgrading to Mbed TLS 2.28.7 or 3.5.2 or later is expected to resolve the issue. This vulnerability is classified under CWE-385 (Credential Management Errors), highlighting improper protection of cryptographic operations against side-channel attacks.

Potential Impact

For European organizations, the primary impact of CVE-2024-23170 is the potential compromise of confidentiality in cryptographic operations that rely on vulnerable Mbed TLS RSA implementations. This could lead to exposure of sensitive plaintext data, including encrypted communications, authentication tokens, or other protected information. The requirement for local access limits the risk to insiders or attackers who have already breached perimeter defenses, but it raises concerns for environments with shared access or multi-tenant systems. Industries relying heavily on embedded systems, IoT devices, or network appliances using Mbed TLS for secure communications could see increased risk. The attack does not affect data integrity or availability, but the confidentiality breach could undermine trust in cryptographic protections and compliance with data protection regulations such as GDPR. Organizations may face reputational damage and regulatory scrutiny if sensitive data is exposed due to this vulnerability. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the risk, especially as the attack technique requires extensive message exchanges which may be detectable with proper monitoring.

Mitigation Recommendations

1. Upgrade all Mbed TLS deployments to version 2.28.7 or later for 2.x branches, and 3.5.2 or later for 3.x branches to apply the fix for this timing side-channel vulnerability. 2. Restrict local access to systems performing RSA private key operations to trusted personnel only, minimizing the risk of local attackers exploiting this flaw. 3. Implement strict monitoring and logging of decryption request patterns to detect abnormal volumes that could indicate an ongoing timing attack. 4. Employ hardware security modules (HSMs) or cryptographic accelerators that provide side-channel resistant implementations of RSA operations where feasible. 5. Conduct regular security audits and penetration tests focusing on local privilege escalation and side-channel attack vectors. 6. For multi-tenant or shared environments, enforce strong isolation controls to prevent unauthorized local access to cryptographic services. 7. Educate system administrators and security teams about the nature of timing side-channel attacks and the importance of patching cryptographic libraries promptly. 8. Review and update incident response plans to include detection and mitigation strategies for side-channel attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-01-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a474d6d939959c80223de

Added to database: 11/4/2025, 6:34:53 PM

Last enriched: 11/4/2025, 9:43:08 PM

Last updated: 11/5/2025, 2:09:59 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats