Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2023-5992

Disclosure Date: January 31, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
5.9 Medium
Impact Score:
3.6
Exploitability Score:
2.2
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
None
Availability (A):
None

General Information

Vendors

  • opensc project,
  • redhat

Products

  • enterprise linux 7.0,
  • enterprise linux 8.0,
  • enterprise linux 9.0,
  • enterprise linux eus 9.4,
  • enterprise linux for arm 64 8.0 aarch64,
  • enterprise linux for arm 64 9.0 aarch64,
  • enterprise linux for arm 64 eus 9.4 aarch64,
  • enterprise linux for ibm z systems 8.0 s390x,
  • enterprise linux for ibm z systems 9.0 s390x,
  • enterprise linux for ibm z systems eus 9.4 s390x,
  • enterprise linux for power little endian 9.0 ppc64le,
  • enterprise linux for power little endian eus 9.4 ppc64le,
  • enterprise linux server aus 9.4,
  • enterprise linux server for power little endian update services for sap solutions 9.2,
  • enterprise linux server for power little endian update services for sap solutions 9.4 ppc64le,
  • opensc
Technical Analysis