CVE-2024-13176

Published Jan 20, 2025

Last updated 9 days ago

Overview

Description
Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low. The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.
Source
openssl-security@openssl.org
NVD status
Deferred

Risk scores

CVSS 3.1

Type
Secondary
Base score
4.1
Impact score
3.4
Exploitability score
0.7
Vector string
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Severity
MEDIUM

Weaknesses

openssl-security@openssl.org
CWE-385

Social media

Hype score
Not currently trending
  1. 🚨 #CVE-2024-13176: SUSE’s OpenSSL-3 patch stops ECDSA timing side-channel attacks. CVSS 6.0! 🔧 Patch now: zypper in -t patch SUSE-SLE-Micro-6.0-373=1. Read more: 👉 https://t.co/mX0YmIUnDF #InfoSec #Linux https://t.co/sNf4K9tE5G

    @Cezar_H_Linux

    10 Jul 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Debian 12.11 drops 81 bug fixes + 45 security patches (OpenSSL CVE-2024-13176, Redis DoS flaws). 🔗 Upgrade now: Read more: 👉 https://t.co/lHbSEqrCk5 #Linux #DevOps https://t.co/2bVEnQm2WL

    @Cezar_H_Linux

    21 May 2025

    90 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. ⚠ Critical OpenSSL Patch Alert! ⚠ CVE-2024-13176 fixes a timing side-channel flaw in ECDSA—impacting #SUSE Linux 15 SP7. Patch now via YaST or zypper. 📌 Details: Read more: 👉 https://t.co/Fn988JMqiS https://t.co/sjL1qFp6jB

    @Cezar_H_Linux

    15 May 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. New #VisualSVN builds with OpenSSL 3.0.16 are already available: https://t.co/M63nfMl2tN There is a fix for CVE-2024-13176, which affects ECDSA (elliptic curve) SSL certificates. It is strongly recommended to upgrade your VisualSVN Server, if you are using such certificate.

    @visualsvn

    11 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨 Lambda Watchdog detected a new MEDIUM severity CVE 🚨 CVE-2024-13176 was detected in the latest AWS Lambda image scan affecting the openssl-snapsafe-libs package in 13 images. Check the full report 👉 https://t.co/6EUGaPyRZk #AWS #Lambda #CVE #CloudSecurity #Serverless

    @LambdaWatchdog

    7 Mar 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. OpenSSL 3.4.1 > a #security patch release. The most severe #CVE fixed in this release is High. This release incorporates the following bug fixes and mitigations: * Fixed CVE-2024-12797 * Fixed CVE-2024-13176 Details: https://t.co/EvRW7LB7gR

    @stevematindi

    12 Feb 2025

    8 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. SIOSセキュリティブログを更新しました。 OpenSSLの脆弱性(High: CVE-2024-12797, Low: CVE-2024-13176) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #linux #openssl https://t.co/nkfkBZnIKE

    @omokazuki

    11 Feb 2025

    93 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. CVE-2024-13176 Timing Side-Channel in ECDSA Could Leak Private Key https://t.co/89cVtOK5it Vulnerability Notification: https://t.co/xhLrNnfyrO

    @VulmonFeeds

    20 Jan 2025

    82 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  9. CVE-2024-13176: OpenSSL: Timing side-channel in ECDSA signature computation https://t.co/FAsS2PF2W6 Could allow recovering the private key. There is a timing signal of around 300 nanoseconds. NIST P-521 curve is affected.

    @oss_security

    20 Jan 2025

    94 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. CVE-2024-13176 Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing sid… https://t.co/d3kYIPZaBm

    @CVEnew

    20 Jan 2025

    522 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes