CVE Vulnerabilities

CVE-2024-2467

Observable Timing Discrepancy

Published: Apr 25, 2024 | Modified: Feb 25, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

Weakness

Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.

Affected Software

NameVendorStart VersionEnd Version
Libcrypt-openssl-rsa-perlUbuntufocal*
Libcrypt-openssl-rsa-perlUbuntumantic*
Libcrypt-openssl-rsa-perlUbuntuoracular*
Libcrypt-openssl-rsa-perlUbuntuplucky*
Libcrypt-openssl-rsa-perlUbuntutrusty/esm*

References