MEDIUM · 6.1

CVE-2017-7526

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion....

Vulnerability Description

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

CVSS Score

6.1

MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
GnupgLibgcrypt< 1.7.8
CanonicalUbuntu Linux12.04
DebianDebian Linux8.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-7526?

CVE-2017-7526 is a vulnerability with a CVSS score of 6.1 (MEDIUM). libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion....

How severe is CVE-2017-7526?

CVE-2017-7526 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-7526?

Check the references section above for vendor advisories and patch information. Affected products include: Gnupg Libgcrypt, Canonical Ubuntu Linux, Debian Debian Linux.