CVE-2024-2236
Libgcrypt vulnerability analysis and mitigation

Overview

A timing-based side-channel vulnerability (CVE-2024-2236) was discovered in libgcrypt's RSA implementation. The vulnerability was disclosed on March 6, 2024, affecting the libgcrypt cryptographic library. This flaw could potentially allow remote attackers to perform Bleichenbacher-style attacks, leading to the decryption of RSA ciphertexts (NVD, Red Hat).

Technical details

The vulnerability is classified as a timing discrepancy issue (CWE-208) with a CVSS v3.1 base score of 5.9 (Medium). The attack vector is network-based (AV:N) with high attack complexity (AC:H), requiring no privileges (PR:N) or user interaction (UI:N). The scope is unchanged (S:U) with high confidentiality impact (C:H) but no impact on integrity (I:N) or availability (A:N) (NVD).

Impact

The vulnerability affects all RSA padding modes including PKCS#1 v1.5, RSA-OAEP, and RSASVE. If successfully exploited, an attacker could potentially decrypt RSA ciphertexts, compromising the confidentiality of encrypted communications (Red Hat Bugzilla).

Mitigation and workarounds

Red Hat has released security updates to address this vulnerability in Red Hat Enterprise Linux 9 through RHSA-2024:9404. The fixes are available in the Red Hat libgcrypt mirror repository (Red Hat Errata, Red Hat Bugzilla).

Community reactions

The libgcrypt developers have classified this as a low severity issue, as indicated in Ubuntu's security advisory. The vulnerability is being tracked upstream through the GnuPG development portal (Ubuntu).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management