CVE-2024-23170: n/a
An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
AI Analysis
Technical Summary
CVE-2024-23170 identifies a timing side-channel vulnerability in the RSA private key operations of Mbed TLS cryptographic library versions 2.x prior to 2.28.7 and 3.x prior to 3.5.2. The vulnerability arises because the implementation leaks timing information during RSA decryption operations, which can be measured by a local attacker to infer the plaintext. This attack is based on the research detailed in the 'Everlasting ROBOT: the Marvin Attack' by Hubert Kario, which demonstrates how repeated decryption requests can reveal sensitive data through subtle timing differences. Exploitation requires the attacker to have local access with limited privileges and the ability to send a large volume of decryption requests to the target system. The vulnerability impacts confidentiality by potentially exposing plaintext data but does not affect integrity or availability. The CVSS 3.1 score of 5.5 reflects a medium severity due to the local attack vector and required privileges. No user interaction is needed, but the attack scope is limited to systems running vulnerable Mbed TLS versions performing RSA private key operations. No known exploits have been reported in the wild, and while no direct patch links are provided, upgrading to Mbed TLS 2.28.7 or 3.5.2 or later is expected to resolve the issue. This vulnerability is classified under CWE-385 (Credential Management Errors), highlighting improper protection of cryptographic operations against side-channel attacks.
Potential Impact
For European organizations, the primary impact of CVE-2024-23170 is the potential compromise of confidentiality in cryptographic operations that rely on vulnerable Mbed TLS RSA implementations. This could lead to exposure of sensitive plaintext data, including encrypted communications, authentication tokens, or other protected information. The requirement for local access limits the risk to insiders or attackers who have already breached perimeter defenses, but it raises concerns for environments with shared access or multi-tenant systems. Industries relying heavily on embedded systems, IoT devices, or network appliances using Mbed TLS for secure communications could see increased risk. The attack does not affect data integrity or availability, but the confidentiality breach could undermine trust in cryptographic protections and compliance with data protection regulations such as GDPR. Organizations may face reputational damage and regulatory scrutiny if sensitive data is exposed due to this vulnerability. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the risk, especially as the attack technique requires extensive message exchanges which may be detectable with proper monitoring.
Mitigation Recommendations
1. Upgrade all Mbed TLS deployments to version 2.28.7 or later for 2.x branches, and 3.5.2 or later for 3.x branches to apply the fix for this timing side-channel vulnerability. 2. Restrict local access to systems performing RSA private key operations to trusted personnel only, minimizing the risk of local attackers exploiting this flaw. 3. Implement strict monitoring and logging of decryption request patterns to detect abnormal volumes that could indicate an ongoing timing attack. 4. Employ hardware security modules (HSMs) or cryptographic accelerators that provide side-channel resistant implementations of RSA operations where feasible. 5. Conduct regular security audits and penetration tests focusing on local privilege escalation and side-channel attack vectors. 6. For multi-tenant or shared environments, enforce strong isolation controls to prevent unauthorized local access to cryptographic services. 7. Educate system administrators and security teams about the nature of timing side-channel attacks and the importance of patching cryptographic libraries promptly. 8. Review and update incident response plans to include detection and mitigation strategies for side-channel attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-23170: n/a
Description
An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
AI-Powered Analysis
Technical Analysis
CVE-2024-23170 identifies a timing side-channel vulnerability in the RSA private key operations of Mbed TLS cryptographic library versions 2.x prior to 2.28.7 and 3.x prior to 3.5.2. The vulnerability arises because the implementation leaks timing information during RSA decryption operations, which can be measured by a local attacker to infer the plaintext. This attack is based on the research detailed in the 'Everlasting ROBOT: the Marvin Attack' by Hubert Kario, which demonstrates how repeated decryption requests can reveal sensitive data through subtle timing differences. Exploitation requires the attacker to have local access with limited privileges and the ability to send a large volume of decryption requests to the target system. The vulnerability impacts confidentiality by potentially exposing plaintext data but does not affect integrity or availability. The CVSS 3.1 score of 5.5 reflects a medium severity due to the local attack vector and required privileges. No user interaction is needed, but the attack scope is limited to systems running vulnerable Mbed TLS versions performing RSA private key operations. No known exploits have been reported in the wild, and while no direct patch links are provided, upgrading to Mbed TLS 2.28.7 or 3.5.2 or later is expected to resolve the issue. This vulnerability is classified under CWE-385 (Credential Management Errors), highlighting improper protection of cryptographic operations against side-channel attacks.
Potential Impact
For European organizations, the primary impact of CVE-2024-23170 is the potential compromise of confidentiality in cryptographic operations that rely on vulnerable Mbed TLS RSA implementations. This could lead to exposure of sensitive plaintext data, including encrypted communications, authentication tokens, or other protected information. The requirement for local access limits the risk to insiders or attackers who have already breached perimeter defenses, but it raises concerns for environments with shared access or multi-tenant systems. Industries relying heavily on embedded systems, IoT devices, or network appliances using Mbed TLS for secure communications could see increased risk. The attack does not affect data integrity or availability, but the confidentiality breach could undermine trust in cryptographic protections and compliance with data protection regulations such as GDPR. Organizations may face reputational damage and regulatory scrutiny if sensitive data is exposed due to this vulnerability. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the risk, especially as the attack technique requires extensive message exchanges which may be detectable with proper monitoring.
Mitigation Recommendations
1. Upgrade all Mbed TLS deployments to version 2.28.7 or later for 2.x branches, and 3.5.2 or later for 3.x branches to apply the fix for this timing side-channel vulnerability. 2. Restrict local access to systems performing RSA private key operations to trusted personnel only, minimizing the risk of local attackers exploiting this flaw. 3. Implement strict monitoring and logging of decryption request patterns to detect abnormal volumes that could indicate an ongoing timing attack. 4. Employ hardware security modules (HSMs) or cryptographic accelerators that provide side-channel resistant implementations of RSA operations where feasible. 5. Conduct regular security audits and penetration tests focusing on local privilege escalation and side-channel attack vectors. 6. For multi-tenant or shared environments, enforce strong isolation controls to prevent unauthorized local access to cryptographic services. 7. Educate system administrators and security teams about the nature of timing side-channel attacks and the importance of patching cryptographic libraries promptly. 8. Review and update incident response plans to include detection and mitigation strategies for side-channel attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-12T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a474d6d939959c80223de
Added to database: 11/4/2025, 6:34:53 PM
Last enriched: 11/4/2025, 9:43:08 PM
Last updated: 11/5/2025, 2:09:59 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumNikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.