Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54764: n/a

0
Unknown
VulnerabilityCVE-2025-54764cvecve-2025-54764
Published: Mon Oct 20 2025 (10/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.

AI-Powered Analysis

AILast updated: 10/20/2025, 21:39:46 UTC

Technical Analysis

CVE-2025-54764 identifies a timing attack vulnerability in Mbed TLS versions prior to 3.6.5. The vulnerability arises from the implementation of certain RSA cryptographic operations and direct invocations of the modular arithmetic functions mbedtls_mpi_mod_inv and mbedtls_mpi_gcd. Timing attacks exploit variations in the time taken to perform cryptographic computations to infer secret key material. In this case, a local attacker with access to the system can measure the time taken by these RSA operations or modular inverse/gcd calculations to extract sensitive information such as private RSA keys. The vulnerability is local, meaning remote exploitation is not feasible without local code execution or access. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vulnerability impacts the confidentiality of cryptographic keys, potentially undermining the security guarantees of systems relying on Mbed TLS for RSA encryption or signing. Mbed TLS is widely used in embedded systems, IoT devices, and applications requiring lightweight cryptography, making this vulnerability relevant for a broad range of devices and software stacks. The fix involves updating to Mbed TLS version 3.6.5 or later, where constant-time implementations mitigate timing leakage. Developers should also avoid direct calls to the vulnerable modular arithmetic functions or ensure they are protected against timing side-channels. Given the local nature of the attack, system access controls and monitoring are important complementary defenses.

Potential Impact

The primary impact of CVE-2025-54764 is the compromise of confidentiality through leakage of RSA private key material via timing side-channel analysis. For European organizations, this can undermine the security of encrypted communications, digital signatures, and authentication mechanisms relying on RSA keys protected by Mbed TLS. Sectors such as industrial control systems, telecommunications, healthcare devices, and IoT deployments that use Mbed TLS are particularly at risk. Successful exploitation could lead to unauthorized decryption of sensitive data, impersonation, or further lateral movement within networks. Although exploitation requires local access, the widespread use of Mbed TLS in embedded and IoT devices increases the attack surface, especially in environments with less stringent physical or local access controls. The absence of known exploits suggests limited immediate risk, but the vulnerability could be leveraged in targeted attacks against critical infrastructure or high-value assets. The impact on availability and integrity is minimal, but the breach of confidentiality alone warrants serious concern, especially for compliance with European data protection regulations such as GDPR.

Mitigation Recommendations

1. Upgrade all affected systems to Mbed TLS version 3.6.5 or later, where the timing attack vulnerability has been addressed with constant-time implementations. 2. Audit application code to identify and refactor any direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd functions, replacing them with secure alternatives or ensuring they are executed in constant time. 3. Implement strict local access controls and monitoring to prevent unauthorized users from gaining the local access required to perform timing measurements. 4. Employ hardware security modules (HSMs) or secure elements for cryptographic operations where feasible, as these often provide resistance against timing attacks. 5. Conduct regular security assessments and penetration tests focusing on side-channel vulnerabilities in cryptographic implementations. 6. Educate developers and security teams about side-channel risks and secure coding practices for cryptographic libraries. 7. Monitor vendor advisories and threat intelligence feeds for any emerging exploits or patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-07-28T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f6a8a4d243d1f5a415cf99

Added to database: 10/20/2025, 9:24:52 PM

Last enriched: 10/20/2025, 9:39:46 PM

Last updated: 10/21/2025, 1:37:24 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats