CVE-2024-23170

An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*

History

04 Nov 2025, 19:16

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2/ -

20 Jun 2025, 20:15

Type Values Removed Values Added
CWE CWE-385

Information

Published : 2024-01-31 08:15

Updated : 2025-11-04 19:16


NVD link : CVE-2024-23170

Mitre link : CVE-2024-23170

CVE.ORG link : CVE-2024-23170


JSON object : View

Products Affected

arm

  • mbed_tls
CWE
CWE-203

Observable Discrepancy

CWE-385

Covert Timing Channel