
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The POLY1305 MAC (message authentication code) implementation in OpenSSL contains a vulnerability (CVE-2023-6129) affecting PowerPC CPU based platforms with vector instructions. The vulnerability was discovered on October 9th, 2023 and affects OpenSSL versions 3.0.0 to 3.0.12, 3.1.0 to 3.1.4, and 3.2.0. The FIPS provider is not affected as it does not implement the POLY1305 MAC algorithm (OpenSSL Advisory).
The vulnerability occurs because the POLY1305 MAC implementation for PowerPC CPUs restores vector registers in a different order than they are saved, leading to corruption of some vector register contents when returning to the caller. This issue only affects newer PowerPC processors that support PowerISA 2.07 instructions. The POLY1305 MAC algorithm is primarily used as part of the CHACHA20-POLY1305 AEAD algorithm, commonly used in TLS 1.2 and 1.3. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 MEDIUM (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H) (NVD).
The consequences of this vulnerability can vary depending on the application. If the application doesn't depend on non-volatile XMM register contents, there may be no impact. However, in worst-case scenarios, an attacker could potentially gain complete control of the application process. The most likely outcomes are incorrect calculation results or crashes leading to denial of service. For TLS server applications using OpenSSL, a malicious client can influence whether the vulnerable CHACHA20-POLY1305 AEAD cipher is used (OpenSSL Advisory).
Due to the low severity classification, OpenSSL did not issue immediate new releases. However, fixes have been made available in the OpenSSL git repository through the following commits: commit 5b139f95 (for 3.2), commit f3fc5808 (for 3.1), and commit 050d263 (for 3.0). These fixes will be included in future OpenSSL releases (OpenSSL Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”