Miggo Logo

CVE-2020-26263:
RSA weakness in tslite-ng

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.47711%
Published
12/21/2020
Updated
11/13/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
tlslite-ngpip< 0.7.60.7.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly references the decrypt method in rsakey.py as the source of data-dependent timing leaks. The original implementation performed: 1) early return on length mismatch, 2) byte-by-byte scanning for padding validation, and 3) immediate abort on invalid header bytes. The commit diff shows these sections were replaced with constant-time operations (ct_lsb_prop_u8, ct_neq_u32) and synthetic message generation to eliminate timing dependencies. The CWE-326 mapping confirms this relates to cryptographic timing weaknesses.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** *o** t**t p*r*orms ***ryption *n* p***in* ****k in RS* PK*S#* v*.* ***ryption is **t* **p*n**nt. In p*rti*ul*r, *o** in *urr*nt (*s o* *.*.*-*lp****) m*st*r *ttps://*it*u*.*om/tls*uzz*r/tlslit*-n*/*lo*/*********************************

Reasoning

T** vuln*r**ility **s*ription *xpli*itly r***r*n**s t** ***rypt m*t*o* in rs*k*y.py *s t** sour** o* **t*-**p*n**nt timin* l**ks. T** ori*in*l impl*m*nt*tion p*r*orm**: *) **rly r*turn on l*n*t* mism*t**, *) *yt*-*y-*yt* s**nnin* *or p***in* v*li**ti