CVE-2023-6237
Node.js vulnerability analysis and mitigation

Overview

CVE-2023-6237 is a vulnerability in OpenSSL that affects applications using the EVPPKEYpublic_check() function to check RSA public keys. The vulnerability was disclosed on January 15, 2024, affecting OpenSSL versions 3.0.0 prior to 3.0.13, 3.1.0 prior to 3.1.5, and 3.2.0. The issue occurs when checking RSA public keys, where the computation to confirm the RSA modulus is composite could take an excessive amount of time (NVD, Red Hat).

Technical details

The vulnerability exists in the EVPPKEYpublic_check() function when called on RSA public keys. When verifying keys, a computation is performed to confirm that the RSA modulus (n) is composite. For valid RSA keys, where n is a product of two or more large primes, this computation completes quickly. However, if n is an overly large prime, the computation would take an excessive amount of time. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Medium) with the vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H (Red Hat).

Impact

The primary impact of this vulnerability is potential Denial of Service (DoS). Applications that call EVPPKEYpublic_check() and supply an RSA key obtained from an untrusted source could be vulnerable to a DoS attack. The OpenSSL SSL/TLS implementation is not affected by this issue, though the OpenSSL 3.0 and 3.1 FIPS providers are affected (NVD).

Mitigation and workarounds

The vulnerability has been fixed in OpenSSL versions 3.0.13 and 3.1.5. The fix includes limiting the RSA public key size to 16384 bits (OPENSSLRSAMAXMODULUSBITS) and setting the number of Miller-Rabin rounds to 5 for non-primality checks. Keys larger than the maximum size will fail the check with RSARMODULUSTOOLARGE error (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management