Vulnerability Description
RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the RSA crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rustcrypto | Rsa | All versions |
Related Weaknesses (CWE)
References
- https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643Issue Tracking
- https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hrVendor Advisory
- https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643Issue Tracking
- https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hrVendor Advisory
FAQ
What is CVE-2023-49092?
CVE-2023-49092 is a vulnerability with a CVSS score of 5.9 (MEDIUM). RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over...
How severe is CVE-2023-49092?
CVE-2023-49092 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49092?
Check the references section above for vendor advisories and patch information. Affected products include: Rustcrypto Rsa.