cancel
Showing results for 
Search instead for 
Did you mean: 
SamPirok
Community Manager Community Manager
Community Manager

Summary

A timing-based side channel exists in the OpenSSL RSA Decryption implementation that could be used to recover a plaintext across a network with a Bleichenbacher style attack. An attacker would have to send a lot of trial messages to get a successful decryption. All RSA padding modes are affected by the vulnerability. The attacker could recover the pre-master secret used for the original connection after a large number of messages.

Products Potentially Affected

OS/Product Exposure
Network OS Yes

Repair Recommendations

Fixed in 7.4.1h or later. (Target GA: September, 2023)

Please see the full security advisory article here for more details and updates.

GTM-P2G8KFN