Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28834: Use of a Broken or Risky Cryptographic Algorithm

0
Medium
VulnerabilityCVE-2024-28834cvecve-2024-28834
Published: Thu Mar 21 2024 (03/21/2024, 13:29:11 UTC)
Source: CVE

Description

A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:29:58 UTC

Technical Analysis

CVE-2024-28834, dubbed the Minerva attack, is a cryptographic vulnerability identified in GnuTLS version 3.7.6-23. The issue arises from deterministic behavior in the cryptographic implementation when the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag is set. This flag causes the nonce size to exhibit a noticeable step change from 513 bits to 512 bits, which can be detected via timing side-channel analysis. Such side-channel leaks enable attackers to infer private key information by measuring subtle timing differences during cryptographic operations. The vulnerability affects confidentiality but does not impact integrity or availability. Exploitation requires network access and low privileges but no user interaction, making remote attacks feasible under certain conditions. The CVSS 3.1 score is 5.3, reflecting medium severity due to the complexity of exploitation and limited scope. No known exploits have been reported in the wild yet. The vulnerability highlights risks in using deterministic cryptographic flags that inadvertently expose side-channel information. Mitigation involves avoiding the use of the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag or applying patches once available. This flaw is particularly relevant for systems and applications relying on GnuTLS for secure communications, including VPNs, email servers, and embedded devices.

Potential Impact

The primary impact of CVE-2024-28834 is the potential compromise of cryptographic key confidentiality through timing side-channel attacks. Attackers could leverage this vulnerability to extract private keys or sensitive cryptographic material, undermining the security of encrypted communications and authentication mechanisms. This could lead to unauthorized data decryption, impersonation, or man-in-the-middle attacks. Since GnuTLS is widely used in open-source projects, embedded systems, and network services, the vulnerability could affect a broad range of organizations globally, especially those relying on GnuTLS for TLS/SSL encryption. The medium CVSS score reflects that while exploitation is not trivial, the confidentiality impact is significant. There is no direct impact on system integrity or availability, but the breach of confidentiality can have severe downstream consequences, including data breaches and loss of trust. The absence of known exploits in the wild suggests limited immediate risk, but proactive mitigation is essential to prevent future exploitation.

Mitigation Recommendations

Organizations should first identify all systems running affected versions of GnuTLS (3.7.6-23) and assess whether the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag is in use. If possible, disable or avoid using this flag to prevent deterministic nonce behavior that leads to timing side-channel leaks. Monitor vendor advisories and apply official patches or updates as soon as they become available to address this vulnerability. For critical systems where patching is delayed, consider implementing network-level protections such as restricting access to cryptographic services and employing anomaly detection for unusual timing patterns. Additionally, review cryptographic configurations to ensure best practices, such as using randomized nonces and avoiding deterministic flags unless absolutely necessary. Conduct security audits and penetration testing focused on timing side-channel vulnerabilities. Educate developers and system administrators about the risks of deterministic cryptographic operations and side-channel attacks to prevent similar issues in future deployments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-03-11T14:43:43.973Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682df35bc4522896dcc06591

Added to database: 5/21/2025, 3:38:03 PM

Last enriched: 2/28/2026, 10:29:58 AM

Last updated: 3/24/2026, 11:54:25 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses