CVE-2023-29409
Docker vulnerability analysis and mitigation

Overview

A vulnerability identified as CVE-2023-29409 was discovered in the crypto/tls component of Golang, affecting versions prior to 1.19.12, 1.20.0 prior to 1.20.7, and 1.21.0-0 prior to 1.21.0-rc4. The vulnerability involves the verification of certificate chains containing extremely large RSA keys, which can cause significant CPU time consumption during TLS handshakes (Go Packages, NVD).

Technical details

The vulnerability occurs when extremely large RSA keys in certificate chains cause a client/server to expend significant CPU time verifying signatures. As a mitigation, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, only three certificates in circulation had keys larger than this limit, all of which appeared to be test certificates not actively deployed. The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (MEDIUM) with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L (NVD).

Impact

The successful exploitation of this vulnerability could lead to a Denial of Service (DoS) condition. The vulnerability affects the performance of TLS handshakes when processing certificate chains containing large RSA keys, potentially causing significant resource consumption (NetApp Security).

Mitigation and workarounds

The vulnerability has been fixed in Go versions 1.19.12, 1.20.7, and 1.21.0-rc4 and later. The fix implements a restriction on RSA key sizes to <= 8192 bits during handshakes. Users are advised to upgrade to these patched versions or later to address the vulnerability (Golang Announce).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management