Vulnerability Description
The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | < 5.6.6 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-1543?
CVE-2024-1543 is a vulnerability with a CVSS score of 4.1 (MEDIUM). The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an ...
How severe is CVE-2024-1543?
CVE-2024-1543 has been rated MEDIUM with a CVSS base score of 4.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1543?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.