Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-2467: Observable Discrepancy

0
Medium
VulnerabilityCVE-2024-2467cvecve-2024-2467
Published: Thu Apr 25 2024 (04/25/2024, 16:45:02 UTC)
Source: CVE Database V5

Description

CVE-2024-2467 is a timing-based side-channel vulnerability in the perl-Crypt-OpenSSL-RSA package affecting the legacy PKCS#1 v1. 5 RSA encryption padding mode. An attacker can exploit this flaw by sending numerous trial messages over a network to perform a Bleichenbacher-style attack, potentially recovering plaintext without requiring authentication or user interaction. The vulnerability has a CVSS score of 5. 9 (medium severity) due to the high impact on confidentiality but requires high attack complexity and no privileges. There are no known exploits in the wild yet. European organizations using legacy RSA encryption with this Perl package in critical systems could be at risk, especially those handling sensitive encrypted communications. Mitigation involves migrating away from PKCS#1 v1. 5 padding to more secure schemes like OAEP, applying patches when available, and limiting exposure of vulnerable services to untrusted networks. Countries with significant Perl usage in government, finance, and technology sectors, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 11/27/2025, 19:28:17 UTC

Technical Analysis

CVE-2024-2467 identifies a timing-based side-channel vulnerability in the perl-Crypt-OpenSSL-RSA package, specifically targeting the legacy PKCS#1 v1.5 RSA encryption padding mode. This vulnerability enables a Bleichenbacher-style attack, where an attacker can recover plaintext by analyzing timing discrepancies during decryption operations. The attack requires the ability to send a large volume of trial ciphertexts over a network and observe the timing responses, exploiting subtle differences in processing time to infer information about the plaintext. The vulnerability does not require any privileges or user interaction, but the attack complexity is high due to the need for extensive trial messages and precise timing measurements. The CVSS 3.1 score of 5.9 reflects a medium severity, with a high impact on confidentiality but no impact on integrity or availability. No patches or exploits are currently reported, but the flaw affects systems relying on the outdated PKCS#1 v1.5 padding, which is known to be vulnerable to Bleichenbacher attacks. The perl-Crypt-OpenSSL-RSA package is used in various applications that perform RSA encryption and decryption, particularly in legacy systems or environments where migration to newer padding schemes like OAEP has not occurred. This vulnerability highlights the ongoing risks of using deprecated cryptographic standards and the importance of timely updates and cryptographic best practices.

Potential Impact

For European organizations, the primary impact of CVE-2024-2467 is the potential compromise of confidentiality in encrypted communications that rely on the vulnerable perl-Crypt-OpenSSL-RSA package with PKCS#1 v1.5 padding. Sensitive data such as personal information, financial transactions, or confidential communications could be exposed if attackers successfully perform the Bleichenbacher-style attack. The attack's network-based nature means that exposed services accepting encrypted messages are at risk, particularly those accessible from untrusted networks or the internet. While the vulnerability does not affect data integrity or system availability, the breach of confidentiality could lead to regulatory non-compliance under GDPR, reputational damage, and financial losses. Organizations in sectors with high security requirements, such as finance, healthcare, and government, are especially vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. The medium severity rating suggests that while the threat is significant, it requires considerable effort to exploit, giving organizations a window to remediate.

Mitigation Recommendations

1. Identify and inventory all systems and applications using the perl-Crypt-OpenSSL-RSA package, especially those employing PKCS#1 v1.5 padding for RSA encryption. 2. Migrate cryptographic operations from PKCS#1 v1.5 padding to more secure padding schemes such as RSA-OAEP, which are resistant to Bleichenbacher-style attacks. 3. Apply patches or updates to the perl-Crypt-OpenSSL-RSA package as they become available from maintainers or vendors. 4. Restrict network exposure of services that perform RSA decryption to trusted internal networks only, minimizing the attack surface. 5. Implement network-level protections such as rate limiting and anomaly detection to identify and block abnormal volumes of trial ciphertext messages indicative of an attack attempt. 6. Conduct regular cryptographic audits to ensure deprecated algorithms and padding schemes are phased out. 7. Educate developers and system administrators about the risks of legacy cryptographic standards and encourage best practices in cryptography. 8. Monitor threat intelligence sources for any emerging exploits targeting this vulnerability to respond promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-03-14T17:31:30.419Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f65fd40b920e2707f5ff2

Added to database: 11/20/2025, 7:03:25 PM

Last enriched: 11/27/2025, 7:28:17 PM

Last updated: 1/7/2026, 5:22:06 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats