
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A timing-based side-channel vulnerability exists in the perl-Crypt-OpenSSL-RSA package, identified as CVE-2024-2467. The flaw could enable an attacker to recover plaintext across a network using a Bleichenbacher-style attack. The vulnerability specifically affects the legacy PKCS#1v1.5 RSA encryption padding mode, requiring an attacker to send numerous trial messages for successful decryption (RedHat CVE, NVD).
The vulnerability has been assigned a CVSS v3.1 Base Score of 5.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N. The issue is classified under CWE-203 (Observable Discrepancy). The vulnerability manifests as a timing-based side-channel in the RSA decryption operation, specifically when handling PKCS#1v1.5 padding (RedHat CVE).
If exploited, this vulnerability allows attackers to recover plaintext from encrypted messages across a network. The attack is particularly concerning as it affects the widely-used PKCS#1v1.5 RSA encryption padding mode, potentially compromising the confidentiality of encrypted communications (Marvin Attack).
The primary recommendation is to stop using RSA PKCS#1 v1.5 encryption and transition to more secure alternatives like RSA-OAEP. For systems that must maintain compatibility with legacy systems, implementing proper constant-time operations for all RSA operations is crucial (Marvin Attack).
The vulnerability has garnered significant attention in the security community, with researchers emphasizing that this represents a return of a 25-year-old vulnerability. The discovery has led to broader discussions about the continued use of legacy cryptographic protocols and the importance of proper side-channel protection in cryptographic implementations (Marvin Attack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”