6.5

CVE-2025-9231

Medienbericht

Timing side-channel in SM2 algorithm on 64 bit ARM

Issue summary: A timing side-channel which could potentially allow remote
recovery of the private key exists in the SM2 algorithm implementation on 64 bit
ARM platforms.

Impact summary: A timing side-channel in SM2 signature computations on 64 bit
ARM platforms could allow recovering the private key by an attacker..

While remote key recovery over a network was not attempted by the reporter,
timing measurements revealed a timing signal which may allow such an attack.

OpenSSL does not directly support certificates with SM2 keys in TLS, and so
this CVE is not relevant in most TLS contexts.  However, given that it is
possible to add support for such certificates via a custom provider, coupled
with the fact that in such a custom provider context the private key may be
recoverable via remote timing measurements, we consider this to be a Moderate
severity issue.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as SM2 is not an approved algorithm.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
HerstellerSiemens
Produkt RUGGEDCOM RST2428P
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XCH328
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XCM324
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XCM328
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XCM332
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRH334 (24 V DC, 8xFO, CC)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (230 V AC, 12xFO)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (230 V AC, 8xFO)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (24 V DC, 12xFO)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (24 V DC, 8xFO)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (2x230 V AC, 12xFO)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (2x230 V AC, 8xFO)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+)
Default Statusunknown
Version 0
Version < V3.3
Status affected
HerstellerSiemens
Produkt SIMATIC CN 4100
Default Statusunknown
Version 0
Version < V5.0
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.101
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
CWE-385 Covert Timing Channel

Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.