Use of a Broken or Risky Cryptographic Algorithm
CVE-2018-0735
Summary
The OpenSSL ECDSA signature algorithm is vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key.This issue affects versions 1.1.0-pre1 through 1.1.0i and 1.1.1-pre6 through 1.1.1.
- HIGH
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- HIGH
- NONE
CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
References
Advisory Timeline
- Published